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", "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"}) 18:27:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)) 18:27:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x8000000000000000}], 0x1, 0x0, 0x0) 18:27:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x204600, 0x0) sendmmsg$alg(r1, &(0x7f0000000240)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="aa3188f1f268f634c8c461d69a5cc28fd3e17fc8da42daf854ba65c0bb25824baafafe0f6ade7c9c00d9a3d02094aba5c6edb620af32239c8e37f5dc62155486988035d108db0191e504ff401da17b7a6820f90f21a7f05cee827ebde5d3d67b90c01a2caa5f0c777229ea3224c61b87a355cc741ecb413e874e3911a205dd4b1f55d05a267d3f121df56d466e55ac08f4c01815faf6a6dd6f8677c3c053da4ef65a26840c9b79ba06ff21053f998333e7af1644c57b3e898126bd97", 0xbc}], 0x1, &(0x7f0000000200)=[@assoc={0x18, 0x117, 0x4, 0x800}], 0x18, 0x880}], 0x1, 0x4004014) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 851.769656] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SG_GET_TIMEOUT(r3, 0x2202, 0x0) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f0000000180), &(0x7f00000001c0)=0xc) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r4, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x8000000}], 0x1, 0x0, 0x0) 18:27:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0x2, &(0x7f0000000280)) 18:27:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x600, 0x0) write$P9_ROPEN(r1, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x2, 0x4, 0x6}, 0x100000001}}, 0x18) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) eventfd2(0x6, 0x800) accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14, 0x800) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000440000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x10, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 852.120427] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000000c0)=0x6080) 18:27:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x78}], 0x1, 0x0, 0x0) 18:27:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0x5450, &(0x7f0000000280)) 18:27:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 852.298872] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8001}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r3, 0x1, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8800}, 0x4004001) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 852.427547] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r3) fcntl$getown(r2, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)={r4, 0x5, 0x100, "41b26301318c22da7ecd58bf891d252c547fac4d2a69d9e4cdfff7d480186543c6541ad6ac212b9b74a80a13978b86e07c3840f95fabbf2bff2fb13ca6d8e9fee644710c74c02b1c37dc2969971634cadab310b05db2fd539df0adbe1426a0e71a6d9d1129ee3ca48206d8cec16a41c14839495ed7dba352e33c95aa8390f0774c20e13582dcd5438372ef0e057d80d40e595d0b00369ca23e995a208c2d65ee9221de7453039e37e603363b5c26f7bb350c1bbe1a5ed72c737ee3c57df7fa99b0611cfbb1ccdbca06ee923f50"}) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x800000000000000}], 0x1, 0x0, 0x0) 18:27:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0x40049409, &(0x7f0000000280)) 18:27:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x7, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000004300)={&(0x7f0000003d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004180)=[{&(0x7f0000001040)=""/44, 0x2c}, {&(0x7f0000003e00)=""/12, 0xc}, {&(0x7f0000003e40)=""/36, 0x24}, {&(0x7f0000003e80)=""/30, 0x1e}, {&(0x7f0000003ec0)=""/83, 0x53}, {&(0x7f0000003f40)}, {&(0x7f0000003f80)=""/120, 0x78}, {&(0x7f0000004000)=""/54, 0x36}, {&(0x7f0000004040)=""/86, 0x56}, {&(0x7f00000040c0)=""/172, 0xac}], 0xa, &(0x7f0000004240)=""/135, 0x87}, 0x100) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x50) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x78) accept$alg(r0, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000c80)={0xd1, 0xec, 0x8000, 0x2, 0x4, 0x5, 0xe, 0x639, 0x0}, &(0x7f0000000cc0)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000d00)={0x0, 0xe7ce, 0x0, 0x3, 0x7f, 0x3f4385d7, 0x9, 0x10b, {0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}, 0xcb, 0x8, 0x5b, 0x8, 0xffffffffffffffc0}}, &(0x7f0000000dc0)=0xb0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000e00)={0x0, 0xfffffffffffffff8}, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000e80)={0x0, 0x400, 0xacc, 0x35, 0x0, 0x5, 0x8, 0x10001, {0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x49, 0x9, 0x3f, 0x3, 0x7ff}}, &(0x7f0000000f40)=0xb0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000f80)={0x0, 0x1ff}, &(0x7f0000000fc0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000001240)={0x0, 0x48, &(0x7f0000003940)=[@in6={0xa, 0x8, 0x3f, @mcast1, 0x80}, @in6={0xa, 0x4e24, 0x20, @ipv4={[], [], @multicast2}, 0x800}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000039c0)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000003a00)={0x0, 0x4}, &(0x7f0000003a40)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000003a80)={0x0, @in6={{0xa, 0x4e20, 0x4ca1, @local, 0x7}}, 0x3, 0x5a, 0x8, 0x101, 0x6}, &(0x7f0000003b40)=0x98) sendmmsg$inet_sctp(r2, &(0x7f0000003cc0)=[{&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x100, @loopback, 0x8}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000280)="51508c6ba7ecfe16016046138c18d890ad9ac1c28fd8c31dadfeaa38c50611d3ce57324ddbfe70d124da5c176a4fc2aa9c68eb4ce98df4413b12e65c558f60bebec3d9737866af22b4e7c97cb84968ba2bcea53ad8389396fd054ac81a4c14bc42654a9170dccadfb4773b9e495c0b782df92e5f33c7f78372c7f17769a8c0", 0x7f}, {&(0x7f0000000380)="8d3f777e7873c61386381bd74490b28ad418d84bb6c63fc2b4dfe170b9e1c02db52f16c10011959017c934c7dc4c836828690865c418d4b53a38f8828fc7e72b3a1fc5d8dff52502ce17d6a3c0a1c2878697de9c37", 0x55}, {&(0x7f00000012c0)="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", 0x1000}, {&(0x7f0000000400)="b224cdefccacc222dc20e67d5603f37c53bbf3fe0133429a1fe6c03f3680c8f7700265f5ba6d12ac93d78283090873efd2a6b19b0e6c148aac7ffa88b0e72e41ec42835417f6bcad1b35a21d3ac2af26736a6f7af4f68ededa1483842ad425999c7be1173ac863189b325722cada309a757cd8d36d361e5e73b522b788d4f50b5bc16d20f89acda5f15ccc16a9e3f0f2947e49ccaacb8b4b89e0", 0x9a}, {&(0x7f00000004c0)="7f57586ddb433d253d33adc26b64bbeacaee4825a590f636120549a04babaaf8aa798b665fe553621872a6eb466a8bd8cf68956a1b8311200f8926fbd173dd2ac565d4d0a25230499c2a398420d5a5fe95d28c3434e9a07c5027c8644281991997af4b228dcaa2ac0b57b9b8e5e3b1e4d52318e08ffadf669e704893ce5e6facca5706207a950da1c0421068b3d6077bbde63e64", 0x94}, {&(0x7f0000000580)="151bdfd82095a687468a10d2f23f385269b280666d460522cb84010e4a470fe8fc0875715f9e351b0ed495d5fe216574cb3a0b89e6f39d0d90757f634d9dc658eb95199adac118d9434daf4a48982b5085e46426bca9b851a2168cf8e4cc29b3b5b007d9d57002591fd489c3d117862efc122573e3fb9152ee968e9bcc37a4888927fadc15f80ad482777282364ebe707a49e2a72c48c36802701c85493162", 0x9f}], 0x6, &(0x7f0000000100)=[@authinfo={0x18, 0x84, 0x6, {0x3}}], 0x18, 0x40000}, {&(0x7f00000006c0)=@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000c00)=[{&(0x7f00000022c0)="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", 0x1000}, {&(0x7f0000000700)="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", 0xfd}, {&(0x7f0000000800)="8a6e240b3bec71442c27b8000db8a3ad7fc39f8ed0661b3bd4bf8720a361d1ccf48febe1b58fa63c1a66b24744f3cbadb7bc044ee97bee9ba658897fd69b9cf480753e80964260acdba3c935d2c9cd6daa56820f798ab5d912263201cf68760e4b8d550eb111a383b8f9b2123102cd3e2641b5c98b709a419f45fa59be0dca3dcdecd6a33bc82169e2fa77e88e76ef", 0x8f}, {&(0x7f0000000900)="2c3d6bda0eabb81fe5fd7c41325ced495d6d88a8ac218d422174dc96d3296f61e4b1b08c8978068d0b58dbf4edfa50cafd847f49078df3f7b20430e5b61489b1ce589a48e1aafd15fd0673483851bf6860fc841285c35867c9ceae9af5e3bce04184e3", 0x63}, {&(0x7f0000000980)="3d30915726620b8beb018711626ff3e646f7522bdd4b01e8bafaa839032e3bd3748376849e53a365c97b6a183b1a1c4fc677445c58c2f9f9b313966a1a46ed089bbb861054a21768de65bd5203f9532426f22c894e34cc647e4f9b1376283d8101df49286d31c72ea8f75f74bb6eca6eab54ee11bf0ea78a0199c0eab978a8f9c749e2399c1c76094b6c161a4b5cd4218877a56b0c92269a209292b48622835845bad2587fa40a42ccd157986b0a735d3f172553515018dffece75cc7bc7d392efbdfc165dae8435d9c70be060eda5a857c3d7270d", 0xd5}, {&(0x7f0000000a80)="acb978ff12ffb73b5f8e6e9b3b3dbbe0b44cbdbc9cf2b06a0e884a9c4b4118c806faa7a79d98d3a2c286bac5d98b875b64c72274a227a4e6057d11fd51515875ea8a73cfb3a0860a4496f780ffa2da03856d30dfa28a9eb51016a738f1b3b93a176a72ccfce794d249216701452a9d2239cb39ddf45a4b0a34e2ad60899f4c352b5b84efec5983d4b149878eefb9c456d3a25bd6ffe76c69a8b9e057e011df46f247862fda", 0xa5}, {&(0x7f0000000b40)="2e3274927391da9c19ed7a75795fb4c25f7990262d67c92dc550bbff9539f87a7a11f67b07a986a7105e1229f7e6cf5efc0eefa4224d11b4994fe0d02320e485837218f4bcc75f636d53dc26de1f4a8b8ba2d02e192bedaa778f919750fa2e44ed511d9535d8d74c91825cb4c833689a36d776fc122b03c444e0892997ab9d6889f386c6de7d9e051263672f4f4ab960e4e3fb965cacb5f7bc4878d2002c9f", 0x9f}], 0x7, &(0x7f00000032c0)=[@sndinfo={0x20, 0x84, 0x2, {0x1, 0x0, 0x101, 0x7f, r3}}, @sndrcv={0x30, 0x84, 0x1, {0x8001, 0x1, 0x8000, 0x5dc0, 0x3, 0x8, 0x200, 0x196f9a6e, r4}}, @sndinfo={0x20, 0x84, 0x2, {0x3, 0xe, 0x3ff, 0xff, r5}}, @sndrcv={0x30, 0x84, 0x1, {0x10000, 0x3f, 0x8, 0x7fff, 0xd4, 0x5, 0x80000000, 0x64, r6}}, @sndinfo={0x20, 0x84, 0x2, {0x5, 0x8000, 0x7, 0x2, r7}}, @authinfo={0x18, 0x84, 0x6, {0xdd}}, @authinfo={0x18, 0x84, 0x6, {0x5}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}], 0x128, 0x20000000}, {&(0x7f0000001000)=@in6={0xa, 0x4e21, 0x7b9, @ipv4={[], [], @local}, 0x800}, 0x1c, &(0x7f00000038c0)=[{&(0x7f00000011c0)="6b9c1518908b5098a4049e765acaf0b1ad0e0241ae684bef101484328b5a1e506079d3efeac1488be06dbb5fbd767bbf6cae545a6b2d647f6da30169e5db4c3a9ca70e5a407837aadc89e5fa9e056edb7a6e4f491309516f8a3576561953bb99f8ef1ee4ebc145dc39b5cb71c548fcd29b9bdbb55fec", 0x76}, {&(0x7f0000003400)="ea29be17a87bb34d83031e3ebcdb14aed85a37dd6207792c08df54cb028282950e0e064b923faa0629b21f92ab616dff0aa7ae4db1ad6fffd17056458a13dc5a0e7aa1f37b5c83b087ac2c9f8b2fc89d489ce65ef2cb62f471959859a530501b5864f56caf1aa60c5f1f5ea3c75f164a5d50a4bb517d2b908627740a0c3d64f8bf97e0b2fa2dc87a9f633276e8cef3a2833cbf6c7dffe212aa8aa5a76afdd471a768f0d756f72e474c951b5383d6285b5aa3b86ba2e7c82d549eefa6a65505b508c92d579c9ab2a243fae108c03594760ec06f387b76c52fd0b21738c1287e82f47f4296738c9fbe71912bf231", 0xed}, {&(0x7f0000003500)="cf1659e6d81be372b894f3dc5a0d7dbfc126b0692701e2f38d6cd242685c0bd0530bc029c71a8c160a5bf26263d2867c0b714d4251ad267ebbba04c13ff65b4b3731a4796cb72e9c4b69005499f725f82425b0c30f5a2f8f87b65bdaa54f975062c26ec9e0fdb8039a2a9df8962087f8d0ac5b757027f4c09e4f5e08eb24a324134af3b9c698a7f2fc6890fbd7f2a62ace72cb9fbe69efbba803e583710172eff733c1c0594caf39eb5c014300076b0b12386c2e6eb027808493186369b900cbdb85685a26ce9a", 0xc7}, {&(0x7f0000001040)}, {&(0x7f0000003600)="e96b32306e61b2f475750644403d866f5864c887b6ccb0ae8de8e26ce9a469c505e2e6bac0917658f1e26245e842a28859cc82216bd90c87243aadc0b240943e20fb5f4c02a1b304297b5d46a87fb524e5eeeb7a21e326e4e76d9148e8d8ffa7e8caaed2bcf19b7601b63324659c6b990eaf0f61051052b02c2895cd05cd0d12ae8091c28e4bf73405b01dbb3055c19a7630dbc496ebf9bfe2f6ca6a3c1647539f3c817a20d91644944a3b06b96959d4aace5f52078abd7cea54fda0f21a618a6ebab2321a9586f8709fd1a51cfa3b5d44f1b0d17dbf7c4c2e69c12bfe487096", 0xe0}, {&(0x7f0000003700)="6a98273c1dddfc37e618fb8d73c9a5b3a7f8965ff9d1a598151decbd93b9d55830d0f21775ccdbfa059d42a5f3f734c882d42ab2302005fc2eb84b4ac3d450235f6769c6de760887459e608c37b9a86522792d0f753a038dedea90ada05ccb73ea11433004b56b8643dc06c46b667c5503046e449bcc57d0fb364f250a299af6b4", 0x81}, {&(0x7f00000037c0)="c0978ab18b2af099353b5ed86f42f56d123b3086e63b9d5d931890a38ea49b83de4fea9927f9f7fff85e7650a71b742313187869b2af0cafcf1835f20174ff12faa2d584373c7f7fa45f70908d3b4aa030d0aa5597f91ccc2b5a27dad19f49db6ba2680fb7a4b45957e6b9f2e4d793013e260dea3ba5709433823d16d68240", 0x7f}, {&(0x7f0000003840)="bef07787d8eebf2e9ebe43d862083ad5e09761831092adfac17560036d0787ee9143e77325d8e237dee9a3248ab8b01dbfd762959819989921023b4d74e81c1fdcaeff133cbc4c36c348572128c2128eb0f4e347e16094a3c4ba9e8fa89cc09dbb8820064efa66a028a6f9526c6afe9f9caa252170e7aed698adc465", 0x7c}], 0x8, &(0x7f0000003b80)=[@init={0x18, 0x84, 0x0, {0x3, 0x52fc, 0xefe, 0x5}}, @init={0x18, 0x84, 0x0, {0x9, 0x2, 0x3, 0xe906}}, @sndrcv={0x30, 0x84, 0x1, {0x2, 0x5, 0x3, 0x6ad, 0x200, 0x7, 0xffffffffffffffff, 0x5, r8}}, @sndrcv={0x30, 0x84, 0x1, {0x3ff, 0x80, 0x0, 0x1ff, 0x8, 0x0, 0x6, 0x7ff, r9}}, @sndrcv={0x30, 0x84, 0x1, {0x6, 0x5, 0x2, 0x652, 0x6, 0x2, 0x40, 0x0, r10}}, @init={0x18, 0x84, 0x0, {0x1000, 0x5, 0x4, 0x80000000}}, @prinfo={0x18, 0x84, 0x5, {0x20}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}], 0x120, 0x44000}], 0x3, 0x801) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpriority(0x1, r11) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x1, 0x0) 18:27:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 852.668443] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc020660b, &(0x7f0000000280)) 18:27:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0xffffffffffffff95) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x0}], 0x1, 0x0, 0x0) [ 852.734418] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x80) bind$rds(r1, &(0x7f0000000280)={0x2, 0x4e24, @multicast2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e23, @remote}}, [0x2, 0x5ef725ec, 0x9, 0xffffffffffffff51, 0x4, 0x0, 0x0, 0x576c1488, 0x8, 0x8899, 0x0, 0x9, 0xffffffff, 0x81, 0x2]}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r2, 0x7}, 0x8) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) connect$unix(r1, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x7, 0x0, 0x3, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}, 0x78) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 853.009917] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10402, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x6, 0x30}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000140)={r4, 0x8}, &(0x7f0000000180)=0x8) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:09 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0x5451, &(0x7f0000000280)) 18:27:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 18:27:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb7", 0x2df) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x8, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 853.436952] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:09 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0x4020940d, &(0x7f0000000280)) [ 853.497624] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) write$binfmt_script(r1, &(0x7f0000000240)={'#! ', './file0', [{}], 0xa, "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"}, 0x10a) r2 = accept(r1, &(0x7f0000000080)=@rc, &(0x7f0000000140)=0x80) accept4$unix(r2, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x80000) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 18:27:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 18:27:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 853.685944] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 853.841960] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r3) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KDGKBDIACR(r4, 0x4b4a, &(0x7f0000000180)=""/185) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x8, 0x5, 0x8, 0xfa}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r5, 0x80487436, &(0x7f00000000c0)="6eb72ab7a3411e2cc3e7afa8472ec59614") sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:10 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc0189436, &(0x7f0000000280)) 18:27:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x92, 0x10000) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) signalfd(r2, &(0x7f0000000000)={0x3}, 0x8) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 18:27:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x4, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 854.215065] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9}], "7b8a676925a0d6f4c43141f7a08adc66ce00ae4257371c008b3bee6a12f910b20033655d1b70397da8409cb681a25e5d11ea22ea4ee5b0895a19a149b9c3d3726e2776913026f6fee709bb57118e50dab1a39248ba870afc15b68f229eac0a5f395b9a03ba57d72688acf5fbc5149e90e8eae04feb1e07cd84128ef6d286623e48ce864370d8e85329ff570818feae1c6f01cdad83cb2f7e9dbb1a099406abf6f280"}, 0x11a) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 18:27:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000040)={@multicast1, @rand_addr=0x3b}, 0x8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:10 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0x5460, &(0x7f0000000280)) 18:27:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x0}], 0x1, 0x0, 0x0) [ 854.418261] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:10 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc0045878, &(0x7f0000000280)) 18:27:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 18:27:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0xfffffffffffffd86) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0xa1) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x2710}}) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000021ffffff00000000d2020000000000000000000003003800000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x278) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfff, 0x4982) socket$alg(0x26, 0x5, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1cf, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) [ 854.582123] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0xb, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000080)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000d00)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)="b85b2beb89482937e05832608aa389d4439b7922248d98d541ce98a0c71b5ba8ddeeccc258573c6a9246a27b1dcf77de458c1b3a57cfbffa067cd948f4c051c27c4abdea1ede591415008077cb800c8536582ad2fdc44a1f0c7b27281f269012e909a9925997887d8112aa6c30f87729b09922578a9d7446c705088dbbb7e9f2167c6e839cb855326c16abd18f65070cfd09752cbfc4", 0x96}, {&(0x7f0000001340)="98653270a6f2d955bf1aefae4d9ac253ef88dda2f26f00bf586817019bf4ad785bc6884b1090c63b5731391465387d24c14ecb2d9ed5392b3b1b1ec57a5b11bd601a42f79dfca4b1f0b0c2cf739ba538ed7064662b87689cc62338bb81ae1e4056627b088cfc1778c30bf56f8c75ad8439c7a439a8b53d24ae25b24dc890f7bd23c91648ddcd892b4cb478d041fd9aa2ef5263d046b916c3e782d36d4f49bce5e5c3ade6d469d0dd358f1388d930125a6c645596479109e628de365e10ecec14ac0cd84d9b1dc8b360d24c5e810c84c9900c2f4d8bdb68168fb7ece991b367ff10c23af32fdc612a3a7d7b0bc3b8ce60044c97099c04089cfa4ab29fef9e723966e7834ad7dc2a25d551d013db0ce84935c1bb85c0c20b6b79429c15c1d6d8245b958013b84e33702579a9f5bd26dcaf3b9b376010533ba900e3d960412e37c3ec05a686be107746325b089987a8b2804f46e3cd0113523365af934998b6d82ee12906b8f6b162c0e03a85c09818ea8d6b0b74628e2b9dc70f79131c028e4cae6ab7db1f5a32a79f80a12d9f580f5fe1d934682ce4d465275ecc4d61d3e7a150804b81d682535d9b4f97a44730f59d630916292151563115be068ba04b7e1aeedf9e4086c2de4a651113677f8847cc44470c977bd66f61632c82f6d9f6574e526230d44aa934b856e352104325fb45aea18bdf0a6b0d21ed4674d44acabebf4a3a4c40585b5f805259e46990f903b473baddb304575c12824fa74f945dfb1864715de1e115d2ab14150b9c339e3e58ebcec7c5798ae1fecd937d04476a03eee2b8c857ef4a0269b718838091b6749a4d6fbd950b8ecb0e80bb5f1acc090e074ae681b789c0db68124e555ee1e35b0ac8b7bfccf927f671bb28f83b20b545914553f45785f25467f5f9488d795480b30dfd36e479f5945ee3ba9f66a8fa6acdc0fb1b2b0529898656d7219bc0fd781f8ec1e4b2ac5eebf024be875326f64e35f3c6841fb61d69cff521b4751815f90254b584d8e93c0003f98bc361300f7f05f00e5e5574485f9bad17a55338d791fa3da5c5001b04c0f79fd8b6bf5f8de1e02b714f71b3733beb577d5afcae7bdd182baf90e388ea6545a9309043797ce6186080922a4f211f1072549c05d0a1e1c5a871a0ab6cbd7ee93bcb01f52de6053d68ad08bbf455ec0c384a0e88c9ff3864f22e4fd2f3f4529e6401ca236f3028ad0135f2076de8b8f0e3d28c72f6d8f2573d0ca106784ccb46e255ea6b1fb7bc7f655d37d284475b669634d2eef84792f5cce18b5467d82efe67d9d2a8cea78c439f13a3bca38a6cda913ec238ee51acea1c07dfe92d197bbceb066b6b3477d5a601b8c79da95dc1abd15f4448eb3ee0dba0ff3ae6aee1bb31de6e34d078a661a76d0b91a3321ce39f839ab963ba3f6f61de24768a3949ae86fa796506261f78e17a89269c836e625b47377dfef0542a45e9419a71c30aa551aa5d08fa482c95cbf8caef17a56634cb57bd980fcbc1492a5f6d170e01bf82823df54b76fc27ef3427d845eb54a075d5cc8ddb451a282cb4dff48c12260277da52ad1f595386bf829e3f6fa72e5275a5f8496b5a1d73e49b68dee9f75fcafa3b408a2120d0f2f057c99bed831c4af8df5bedf11d095e10a74e2d22b05c664529f913391958fc3574ad95387b9e6942e516eb59645f4342dab25da8af4a6e99ed96f1598f42fc59f7d19dbf69a908828e0b41644c4e90829d5dc084c0c49fcf7cd4c99a65fe30d0262f9556bfd90249b02a26fcad25f85a6fa5a3f00b99c77ac75a2201625d240c305df9507cb3c2cf045e1b152604943f07a25f3bd3fa6f5f861acf8aa3f43e891e0b6d61508f2cd99a725ed22010422fea807da2d853a56a2d561b1fc81f4bc63939bec38b56605a2f9ae249844d8d222ddaedd961ef149815ae834d3bd3fc0958252f66408661edce57adaacdd4309fea312e22f79193981ed5898de4d7038b451bfb0939187eda6d90dc90f2c2b2b799c869475a409b3433ab5de21e040f9c795457e8170648727e73089c0119916028a3fc682c6ff108a7e7e00ec99587f0430fa5651697035f7cbf226350673554970372a437b5744e64e3f5ac83040b10e8fa95930907200665b1a6b893ac90259c08bbe9bd980701b089fdcfcb55b23bf9834860939605a10c061d5bf0b30a0f29373ce37d952f7fbb0ac9864a9ed94541bf69fce531bb1a30e55e1775e2d51a2a1d46540f324a5eb809a72f4bc772e99cf61120d5f53645eec8107ed9088faca55eaf48fdd505e755a9ffe96fa4c56e9cb600895dcf5170df4c2b823d90fe41f299c0a0294b2cb2972b5fa7f3f96afb98b42145c85ec65fefdc6e9958a6212debb332090af89a011763dc538c1ab1e6de720e559bfab67000c187a3fd4731c37b6de16a0e1a7d22c52c9362ef87d813ff6713a4967fe59601f0523b2b3d79235922f99cc4e0923ea006e1433343588c1d33f0f6c182ad54aa52d412b5e214b35e151d46ef6f4d490079eac0108fe205d23240368827daed179ce3612e0e978cee572cf8aa022ff338fd60ac9eed0d01e0c6f6a58c8618bd8afc6f16d5da2077a301442ac1850037effa80c416a6b2fc4abf74062e127cfb88de0555554321e18f40e71dba9c70fea010c972dcfe14bf099faf2bfcc0a4094570be25ed0ee4cc11fbf2d483cc2ed88aaed7ce767b191d4d60fa112f5625c624f6fe7fb73528557c1557fa986ec9f4b60bfc37b8a46d5a67a976be606b53ca9cfaac60a0193cdfc0cb4b6f45b093cb1e840ec377f95089e8abd422f06f084b7972d660362027c3452d8a0b362a17046b8a7e37132ec8bf3e542c32b543bb00cf7d96d305e6fbf155877a4a365cb6e1000835f317c47e8e08b5fd344c38e2ccbd0915ebd9a1f00aa9cf9a6da67a3081d5f7aaacf7b6ffdb9c94bc4290ae62abb35a61b013d341a404536b2e5b01d57da180a8f31ae1ea087238944e32e18b66e996b21370a7cc4f0405a9319e35132d8586aed1aa077f1b64d8a07ab3c03d7c04bd6cb926e60d3df646822cc12c405f140ff709c3c754258c7bf8d7053ee75fbee9c64cb14c96443b94b50a437ab5ddd0cb254946291fc54c8e362cefcfb4b7bcc689d63f485112b916f274936552a8749be31c056588d995c155a83f9620721849064b53753b4323a84bfe6d1d229f76d91ac95aa11cbf7767735269fd8907e0da23d7de345cb472715e362b5044d263abd023eeb7ccda6364dd1545ecccb7a288ab333b4887fafbe91f0c4fc95ba8f8506b0473b2b5ef72bc7430ec8b1031722733d6e971d958fd9530802322ed02b1949e95f46b605fd7f5492cb008567fd076935ed52f94481d907e84be7f2a8cdfd457c3a353ac9f81453c325979232ac968e8dcdf41936d7291d04b7de2b3767a64690ba733e7ee04edeb0fb2daeacb5c8325cde3e43ff727d1a5b95c0576d6593eaeddf36348e004af9ae31cc0753dbbd6207b8c680bae0533abf0c85fce54c8863866d454075bb16842ef34386e981933c1d02ae93299d48795d8746e6fab21ef187dc76d9289a41eb97b5592e446967558d2fe83f698d4cf620cc133f13f13dd11dc7b4b8fc35ee930bea17e1be0cd100c703d2b968da5afd322c6d8b8ea3bb14c222d8bd170a5cf0c107b5715d51acfb1a2259b75fb1dfcc7ab5b04907cbbf05f4605b23018ad29c8e6c3de23bc804868a47bef5db5e7513f808866e95788056aaa2353bd9cfe1bc5cbbda04ce796f4bf3065945e566f1cb2e3ac89fbf8227415df92de1c30012ed361f9df8d66d0db157ddee8d8ec41701b471188578b4b05773faecdecb130bb1fd79ae86b5f6d0b521e84bfb34ce6aee139192fedfac36aa7cb820c837086a5ae5fb006dcd21135405f4ce292fea13395041b749883a7103c85977f0ebf15cc5f9b165ccd2e95e83cc9ca5db1cd1d5928fdf60a6fb412bcbe9ffb1d4843270bfb52db75eaae069cb35025cd5d49da515dc423f4268f7cb02c11d6c5042c4ffb5713b8e64bd03442fc9f9869cff418f1ce792d9ef78bae35990b43415aed62904f31a8e40c7156dfc83d7b6267a3890b60f33608b18668506c565b48c9c019c467856c551d8ce03339a5f2ab4db9861e2714951849443801f933e31a84d012e34d9f6fbdba6e20554aff506b371ac532aef684e7e23ffb6f710ae93f48afe18a9ccc4f68082702de644c6e43160a42af40de57c5754a33c4cef572315e349122e13ab33c59b663ab46860d1679f50157f12b41637c56377b40e79334d097eb8d4348de053ff407ccdd1f69d7763590bb86bba18c32266c43c6302d123eb67db83d44bd6b482b8a33374b0707cc4d76d3fbc4b1a9cab3343f0387a42c280fb11c4092fc928c3fc23e8057fb085fd8b4e5d3cc8128926dc04dc0c40c2bf27312d26d230c11e48d000707988e3ada2fbcc59c116499241f4e67bc44890a26c58cbaca027151e97e9674c1a982f2d56f6fede62d5e2540593d2c566631c31bf389922fa36baaed6314e9a41ece5816a1cdd98ea8a3ff39765f7f9b50b28083e4448e1872d5a7a362886313ecf946f53001210a253239c0902d6c8887a02bdf1526077afd7ea4ad0b3ff3f53389d187cd5144058ec3ae347b2a788bd96529467b23d5b8eb0acfca4d324df81fd06b20110707d454d035908bfa7e0c8ced5688a6f1b09320a40dec9f32bf624aefe05f24655ef25673aa660b9532feb9578b7852f32432abca8e7cdbe8759e5069372bca4246205b079515334ffec318d609c875a51380ea284f562756fc178a22bef910cd3ad0632d7cc6f749bfa703b5d67d013ab81778874e472abc01b8e111e7530017ea7eedf697e0652ec386976e861e246ac7009f14aaf6749b3accefcf00b734e4570c5d4162359c99adf5e85f294579321d0a368daf70905627bd16b219240df0a4814e7a862d0cb3f4ba6f34c3060ff469a6777a50c6a0c466117a32ede566334e1b0f16c7e8e50d3827d84e0da29ab19ee3744b7e1c54d07578db459c440cadd2cc3cd2ec0ec5bda358e15e181a029ca4d324bcd85d92695eca7acf0461cb55318eeae61957206401b4d47c4e15f1474698a593cc61cab7dcb90bd0d1807aaae450740f46e5b457285c31843ace1758868ffe60478a1d002d1e2df04c3f59302bcf21775b76c36a1c2c459d607576c80a7e8ece75a8512a800aaf0a8224f4d5367cc92251027c6abf885d0e39f6051c577c7b8083d7a3a4af1a81a0ce5ed2093d9482c7a617b6c25bfed91ac274ca06517a186f26ef36a3a04583223959023ece2e6ed0b1cebef8136b4721d8dfb1c7baa6f3a06304c480749d3c620a3276fcda96049dbaa903cd1bcd433e4de16ef963f287b9032bfccfb156f53065af6f733f46867384f47bd46cc52a5cc980889ac545a1e3764f9729d090512753481c23a7ca065e7d688afff2e66aa6af1987d2d02f0d8e9325971359353ea5041c66354dd45b54c8488b4342b61e35164ca44f63d05a43da9418024f472d9ca54cd61e2cdb5f34f1d2849b0cba0c8378f3300ac34c732e63fba882cc671c25fc85dad4ba61f23935813e83293a623a83d5181808e246579f2deaf2080ff2943904394c3db3841096b627a268c8f08b684304e68a28bdd11dcd6eb3d9e6209813d24104d7b5a794351e39f54ba3fb5aa03b93ba5547b5bd18dc8bbfb0f57c2e74d8f69b46a89d8b80c93388070b0cc2802f9d3dfd7aabae932f453e990a9c43f681c5c505c034e9efa0c4aac499b61f76dee18d7e", 0x1000}, {&(0x7f0000002340)="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", 0xfffffffffffffe48}, {&(0x7f0000000200)="e7ce7f3b176866df7a3536883a19592ea4c07dd7b544a95f56727d75d427a0353489047ea4d11756d62cb51e3c1af446d6ae071b651322eb4d1ace2e6ba4bedec1172667abbb10e9d69102d25286ddaccb749fa646f5eea012e2e7f38b39946d66c1f6e14dc1b02518c2ddef07dc5729ae04ce2a0d65afd1f4c1c7787039d508842f16d36bf2d13e447424d9908159894d75df112b140346843d36645f531277f9c61c54312f9d0147a3cf0a26d34bb21f6e104fe35a806d82d26cf22aef", 0xbe}, {&(0x7f0000000dc0)="a1ce611c10dcacf461615f5f768d8a265aa4a2a2bc8025e3e242d3d292624e1774d215e835d81da4cad2f1713fb773e0ab7cd0e05fab0a5df8779cefd4ff9106e8eff3b48ef1d175fdfdec", 0x4b}, {&(0x7f00000002c0)="092ed14c0b6ce25a240a0986383dafbeefc03ab3c246d90763ab70b4191cc86410bff3e1994fff6ea9a8872c8c3e0255712d241e69e9d52958a5cc5ae8442a9c9576d027a1a56ec54cebd4d1051ae1f8c045fa41bc0f35b7609a327ce235dda2b8e20af7898cee233815d44e986188bdeeb11c992c5c874beac8491c66e8fd505a4719fe038dea220db79f61f846251a3f5d4ee8afd2836a455001635e384a84ec6e8ffafa46130a38a7117dc19d41a9c5b400a2f7b755e8f3d5220476cf992b07daca70ba8a4c81478f02cc660c4339170c82", 0xd3}, {&(0x7f00000003c0)="e163cfa5960ac747df66b016a034e526461918f93013f72333a3a570f0c3b75b5c65747e52a55a8d6dbec36f6d737520a577525bf706efc29e2b73ff4fdd7634e0ff9315ed4c7fca98b591cbadf3cf3170ad94294f06492664149a0bcf3fa62ffc4ebcf4bc7fe649d4da418845d7a5bfbb551a1a333e23e54ae98364f60b3e090c4d4081215d0b1f740f9c80c2d2f701b8950dd218a8510ad613d742e7889c5ba344fa65cbf28ab256ce949db938ff3f7e7399059678870ba6db11726e80aabf9ed3f89eba71b37f23d2e6b3fdf42e", 0xcf}], 0x7, &(0x7f0000000540)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}], 0x30, 0x20000000}, {0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000580)="6b58ca832baf5d6726ddb59c9a74b0a4a2af36f09ddbac5b8bc6bbb3dc5ce765cc878dec93aafcd328e80ddcfb6a1b59575f7733f46614c34760bbc83a3aca6ee5c214813fa612dccae746ea44d049d5ff0a643ece8f86fd516cb3bd566665502851cda4f28032b405e27557c11f122ce7cd069dc3dc05098e525efc407788ddd7f445879f2005da06acb46c586eba4865e02977398c34b08ccb181720bbe2b8531755b102782164305849085a9abbdd63d0d7348518d0091c407e8731c51a6ee7d2ca2480d89bc94ded819257318d08c7fcb8bb2221d469d61865607fbcb2a73c52e19a0f261884eabecd6fc08c9478e318e1f4ba", 0xf5}], 0x1000000000000076, &(0x7f00000006c0)=[@assoc={0x18, 0x117, 0x4, 0x1ff}, @assoc={0x18, 0x117, 0x4, 0x3}, @iv={0x50, 0x117, 0x2, 0x36, "e0304ef74a1d620d5be31c7463af8737a952ee27d103837200ffe9c935f42bc6cf6843651cac228202a42ad5759c652d671879e9703a"}, @op={0x18, 0x117, 0x3, 0x1}], 0x98, 0xc000}, {0x0, 0x0, &(0x7f0000000e40), 0x0, &(0x7f0000003ec0)=[@op={0x18}, @op={0x18}, @op={0x18}, @iv={0x70, 0x117, 0x2, 0x58, "450d74087b9d628636ca7c2f0c9bb63246841b16f06f077ceebd0fb4122f17abb14e29ca27e29e536f3534a784b8490857ba3da83bd960949575e94cacf540950fb5d54d409451b9bc104fb87349ae19b37982bd1b76a904"}, @iv={0x78, 0x117, 0x2, 0x60, "f8a72d92f2b79c17553a631fcb6e4a60463f9cda55e5b7b22bc69930125c9f1220c921d019399cdaab62dece0f4c3b6963a6e107ebe0e580a45efc213ac0f29d6309b88e487f389d8b03093be8ecdbf10a0d1d4e8900db62fc6ca3f71a241761"}, @iv={0x88, 0x117, 0x2, 0x73, "31d9edc5bc7a49c109969faf4d5381232a4e39277268123c24a80aed6bb4b5f7c6c8c70efff476d4edb5456293a80d679b47278047cecef8a0ce64d4026410fd06479fb5177ccd252c2301a0e10fa0a9ac7fcbf6b32870499ef6d114d545a63290d8993d0db0a16e018ef1d9f8710bea83470c"}, @assoc={0x18, 0x117, 0x4, 0x91}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x0, 0x117, 0x2, 0x0, "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"}, @assoc={0x18, 0x117, 0x4, 0x4db}], 0x218, 0x40000}], 0x3, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = dup3(r1, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000100)={r3, 0x1, 0x6}, 0x10) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x0}], 0x1, 0x0, 0x0) [ 854.893145] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4b4d, 0x40001) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f0000000080)=""/101, 0x81}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000180)={@dev={0xac, 0x14, 0x14, 0x21}, @broadcast, @empty}, 0xc) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x47ffe) 18:27:11 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0x5421, &(0x7f0000000280)) 18:27:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) clock_nanosleep(0x7, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) r2 = semget$private(0x0, 0x2, 0xc) semctl$IPC_RMID(r2, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140), 0x10) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 18:27:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x1500}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 855.122568] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 18:27:11 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0x5452, &(0x7f0000000280)) 18:27:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 855.337092] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x3, 0x0, 0x0) 18:27:11 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc0045878, &(0x7f0000000280)) 18:27:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x4}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 855.536756] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:12 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x2}) 18:27:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x2, 0x0, 0x0) 18:27:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x3b9ac9ff}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000002b40)=0x7ff) sendmmsg$alg(r1, &(0x7f00000029c0)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="6bf9453994473da3b15c2f4cf1687eb60b436b3a61052dcabcd2b0e3a68740cd3ae08ba032c5faa8a095ce2a0270fe7292f1df1c0bda11a01d0030e6907d8bcd24ae24b9bc17169c966b52eedc4602aeab7cc4ccc6baffe98f014b1d97fb989bbd9ef750c07ad7a67f15f0c28966e1b2d70d0a02fc6180ec60145e164a931b82375df18d3a1242346d080c2a18ab8c551fe9081bca5b4fc82bf75e6db83e835f66cfaa1e249008976ccd8c0402cad26fd9dded694e166ba7c8c3bba91e2e07dad5d4f8e0ddfba373caca79220188cbe6f98c91", 0xd3}, {&(0x7f0000000240)="2ece2a36908ffa11bf8f40204896c4d6fd090256ace88240490a98df7abf5a6a9696593ed3b74bae845ff2e485b2ed2ddca0a2348d82be0286e3a273f5f687a73839f1bef98390c60f65eaba9c32b26c36b67c790ce8c2c4c89d168be122d1e4ead15187f1a1e9d36384101faf4dc39f91fa86086ae5b14d77dfdf1e683063412e294e03ae8a1cb7816f341f67580ad7ae827822e0b03a2ed969bd9b21c9baf81b079bf46bc5a4800d01994eafb0e6e341e49f5cdd1bcb07631abeff4aae854492672d0a403792d46fe5148f762b939affbe7382a9", 0xd5}], 0x2, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x40800}, {0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000340)="7f5e057e9f02db66dc01c01bc624da352b437fa82f290d7e5638772a088997076d54aafb3b9e8b8c9761b952bce6dad381e0eca5fef636f4efb7eb81e17b9ddb810c7e9bbf29c898e4c277d9b316247e6cd2433293f5eca0c82fe56bc301190c701d6bfb79c13b8adfaf5a9ace057a75075a9741230f6ac846b523c0cdcf5833364bf09a0bcada3ba4f56c1f7c5b2638a1e3e95a833db9a2c3d320e3d82457fc78a1e4e0867e4fa0f29b6e8db39f5ac85e37a26a54280687387bfc134a493b538fb5a1bb9d691e6e35a3f2a0f3", 0xcd}, {&(0x7f0000000440)="8bf8835ee5cf426d9856d588c9e3b907c59be129d280f81c7e95831b61d85c3de593848fc0bfa041d9abc6e740d6804ecdd21c608206b3f8c3bd127b987b78df2eff4a6593fe1825f9f884f878b8b215476d77edb13b54262ae38e971411a46263bd1dd5f29a0c43ca1ac11f226604ff648a7759728afb39bfc226c45fcee4ebf1ecb4465e7ad2e7c7eb9d4cadacf7027910460dfd0c17ee299315dff7548e33e19fec96310950369b9f3f9bba179c3f4c05639a98d0f7ec098fc0", 0xbb}, {&(0x7f0000000500)="8eb29ecce24ad9df8225ea29545e04020e14657e848c8e10c077a54ab7c356ce1bdfa3b0dad59e7f01df67020158474fd20c3594ed1fe46010c84b0018129e2b6b0d387a87f3438f", 0x48}, {&(0x7f0000000580)="982703bfa2c72f5b1cf20a664fb4f4bb1036b4a631131c48f4c52f2c810a15d30004b73ac93166159415fcb2a070db6fb215848361a03b47e9dab755edcb5878d1be", 0x42}, {&(0x7f0000000600)="2c5fc26fe4eac17019e42d5d1342f8c366375adad4a4f7f173e7fb99c9a2268b3c38fc637c90579c781f6ff4bca04fb1b9007545f78d4ae2e7d799634d983a419c644af76b534939", 0x48}, {&(0x7f0000000680)="8706647088e22245f9b875370b8b6e27a1be1e688f5cfc878c9b2834bc96e89754f2fb8195ea1d1f38ab6191cfc4e7a4f410a1363d2410bf1c67a273a17766e86102087529817ae6a8b017817bb188a78ab67ac570da8bfc0fab5497da09e08fc19ccf5ec2c4da66cdd6112e4f29567e6ec1e6e2f75fa159281592be1ecbb0fdaeb8a45fe6db69124476754820f278c8dbf30fd9fd2d8bbd2cd44bad7c22fcb0428db75795928f9db7ff6924b928a8566cc65fcdbeb52ff0e9a57821745b01fb6b71b1263603b75746cec9b904deb23b02e5dc25b1ca2cd33b04a725f00df17c7eb42b7b82c822cb", 0xe8}, {&(0x7f0000000780)="4ff8dd52cb36dcfc76d0ff87d391a67993fedaaa94acdfe513b320ca63955cfe52625fdba86d807f1d239e2a8fbde669b08b32b551b638d22f0df1bf", 0x3c}, {&(0x7f0000001340)="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", 0x1000}], 0x8, &(0x7f0000000840)=[@iv={0x28, 0x117, 0x2, 0x12, "bb17bcf9224fa981ecf4c5069e0f6112dc02"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}], 0x58, 0x40050}, {0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000900)="c6a7bff7d470f4b864287562ba4419b9bb001c4c0522502d4134ed6cf2cce1e917d793312be674d0efe1f699adaad4009c5c75aa6ecc83e731a24b6c7b", 0x3d}, {&(0x7f0000000940)="5ab1f0d2f43ff825040aa8455b4464f6912daef35175aebdfe189da384d49c10091524006f464dd364f0e0dbbf3f3a46e57520029a9bd2534da9159b0d0b24283143b02d8db6224455aea5eb587dd17b93c2f9929117788bc96549b54b8e603dee2cca7926e0fea68a14fb518adb9ef6052ea7d25afec69eaeb4e79a1179b4d29be58a0eb9bd05222ad1d90087db6fe300fb34fa08b91dd2e76254e0eefedb49bdf6549f9a801c22069c776427a2c178f709b70f110b296d5c0c401d2ac00f37db23", 0xc2}, {&(0x7f0000000a40)="6525cffa65b49832b872c6e9da7859565bd888ae64feb7d732fe7f4fc4897092a9f2aa24e5978e087c", 0x29}, {&(0x7f0000000a80)="7af417e1202bb0eb94d7c713e618e514052941612884db5e2ef94c1a471565d6a2ebbf80698e3bf6220ec36b9d121b460546bdc82c462219aea2be71684bdba55168c316d1454c956e1286b74b8561a44bf8f00010b04e4447d689422a2c39f6b04388c44c0b77cf86046e2d5b02410f214f1cd5055960ae152f74eae5", 0x7d}], 0x4, &(0x7f0000000b40)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x30, 0x117, 0x2, 0x1c, "ba1bb9531ac287c09b0f27b0dfa164fd89e40c8e8c5c276cc1bc3574"}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xc8, 0x117, 0x2, 0xad, "616dfa143368e6aa6d0aa1ea602284de760694d00b4edb23efba238c6b6cfa456abe7403abc82ca4e91cac7b6037000c694dfe5e531ee5b8a738b71b06a293192add603d9f5dafc8a82deaed153c48e6d81a1396e76f2b84a6ef1b597334764c432896cfbfd4212ca54690760ed64a1e97838c109c74315465a28c84dc0c959abf307422f3646c85c8078556cd1b63524bdf19598756071b958b525262b2398293aa8ba1342e8c08c0308b4c21"}, @assoc={0x18, 0x117, 0x4, 0x9}, @op={0x18, 0x117, 0x3, 0x1}], 0x170, 0x800}, {0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000cc0)="e78338c7bc71108277cc5fb39151936ebd15a19284c358794bb9b34887f57fc8e25b8d1002ae390d9bf7799255096d36bc12c14bb1f5b1a79f801a9ab18458b072eac22b3e570c510089df8e882b4006ae153f79e685de99b19bf5fc6aded88cecfe0456043a5b1f4a2daeca591a919a14cda0698512b260b0c7b563d17e1645c10fc52753218925f7e64083a89b1b01d78d22e4fa332502b190b6a60833aa0c90e8815937369c83e690ab49b193517deb865e4f52042ccc143f566656c75132e4ec47fca95b0a0228ca861e15536db685eff11b08fcd05862235cfb0504a591a5d4e4f5d2c37e6cee9523", 0xeb}, {&(0x7f0000000dc0)="cfdda75064b4d53b8dc906541ca749706026e75a578f425f560febdbcf99f764c329d6a703a256f86733903a37fdc5ad9898b47adecdd8a6dc061b", 0x3b}, {&(0x7f0000000e00)="94629bd031a5725e554f43a72021aec417b7adb82fad13d2fc0039", 0x1b}, {&(0x7f0000000e40)="c345c6eb7b09f3fbae0e36b62692556fb63a91ca3a6255caea44d24634f3c82586da721e9b33aab6", 0x28}, {&(0x7f0000000e80)="21f577d89d4870511ab6a1c2c5ac41cd829c966d3e54128a3d40d37b352bd8def67c28ab099def30ec4f9e", 0x2b}], 0x5, 0x0, 0x0, 0x4000080}, {0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000f40)="579069562feb06ee152a428578a7d64acfd61c004cc25645d353fdcd5870fe5b03e1b6fe513e4e3a465bfc79f0bad0023e391bf600d0afcd5258a85980200b5147e81b40ee787eeef78bb933aaf095853f6b70704629eb79fb839510aef5ac9bac1d5747ab457edde39fded48864517e5b1dd37159c496d778c44a5cd3b85941bd5393c8fbeb0059f82760fde421b0957c6ef715d453c44ffeff", 0x9a}, {&(0x7f0000002340)="afe1523a103974c6ae956b98caddf2c8accf0ac2324ed6628d2cc26b7f47399d5fb522488b2539f778f65c6e072bbf7fad7b6e0dd0f1e77d8f37c6b58d642e906f51309d7abf5172b483115e367e293b1688d80596e3edb3bd3d60692fea487cb28b97261a70f2fdb3eeb2e1a3d7c74da7a21b053669f5422def5df3508662cfa556a0a4e967b7151963bfcae5055e7d2026612d81f7fcc06003758e67e52271d6fa53abda551dce8ef294c8857eaa0b10d7b1597b9328d0d6f9d7252e283d1a3a9cdf36d3bcee5ccd883bcbffaf6225", 0xd0}, {&(0x7f0000001000)="f1736e892c978d7b863faae0fd52eb6f94af", 0x12}, {&(0x7f0000002440)="49b5b1e07495a2bff7155447c1f9246dd0cff62bbba5cceb7a45c292b83ed4bd25b778253a8d548324cc889baa70605b210524adf821eddda37b680126f578ad0991ce1963e77ac9d897b3e8f523beed7256c33514e431db89d79702706bc1182301951c04d10c4eb11d1648542777801fc8550d5f6f77a763dacd9ff112ede1ae6b4c9720557d9eeb69c529f055d347c89d338527d7ca8f732e7d8d24d19ca0f8e1cf881545fe3a6dedc7f2be9f0979dbc6a48d4c829ccbbc7438ec6ac2cb78f58bdc5384e30dce7a73ea839729f3cd07890f8cf6218a572bab2e42c3d1c313d6c50f0268b3a1e4f0856bb553d408b0b2125b8ec9cc", 0xf6}, {&(0x7f0000001040)="494ff3a872bfc77ad1d4d683b99a9bcd5529a9afa58c5aa616070a88ce15c3ca495c3d63", 0x24}, {&(0x7f00000011c0)="ebbfc782e4ee50bd8100842d032984fea89eb3fcbb4a3c4930bf78a5f2f21ca5daffe9c48bcca9512e22d786d5984f3c44e1099264c0bb33221a54077bbe1fa9eecc4fea9512c8538c1e5405f9853f15dc73ff95a682a1bc2f04582681c9ee26168a6020eb513724766e9cffeec8747a0d71d6ccde59f3dc530eb1514e294d4b3e250c3ab0e756780be23b4d7f0b4f2bd7be965ced44d56d8c9d8b41b1", 0x9d}, {&(0x7f0000002540)="fded25da0b76beb353957acfd0587688b555f50b3ecd60bf59129a05f48a27a6bbb96bb263be6f31f947b164acb813f00333b95f88ca83463a9029551d0be9211372dc4193274a28f98576d1eba53220cbf05f3bbca62a7195210004fecd731a4d3ade8d8933da269a7ca2d7d08bd3be96c3e4f5ab22088b59603657e9f1855286e369b2ac1d702a9642b0ec137b1eb3325586296e6bc9fb3c9eb68711608e98f2f6c17e280780b34877621500a02bf078e5f70a9062fe43984eb00d43ce", 0xbe}, {&(0x7f0000002600)="55993922fa06c588b89f0397e1250f2c3b385841d92fdba0df70c3f566767e0bdc8b3ab45923cc7307f7a7740c17bfa2015b211fe2c2df4fa2e5acb84123732d6ddb9b2efa93878ba2e6df682990328653fb854a831d228d21356be1be3a24f302ed1661bb6b4c281e3b8a5ac7d2f044ee3e92892e4ee36077d5d53648580cd1d2bccea48605f0340283e8f42784c5e8b8ff29c32ff2079c3272e194b61d28aca744e41fc974a5e580a4972df29a7aa45cc7d5ae138a05d2c9bf66a8939fa984a6c54da94c06f810c5168a2cf2", 0xcd}, {&(0x7f0000002700)="e272327fb4f09473e635595ed3439985062c0ae2090797506647662c9dba35aef900494c3eca4bfca5b4c518e83d17af3f67dcf9e1207f431d7cb336c8cdeb03805254845f443685005d92f5b487ff0e1600c325ea2b5efe7865455b44a3ba5f156eeffa", 0x64}], 0x9, &(0x7f0000002840)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18, 0x20000000}, {0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000002880)="e7354ffea3a8df31f85600e62d03821ecfb6c38be3c968a95750a7bde773e6d782a894902920233456384896cacecb6f5498bf", 0x33}, {&(0x7f00000028c0)="89b3a81210155029ef7ae0a659c59bc454e0867430cb682faa127af3918ec04334f707e582b20d930ba081e3459d1701433a0a3ed37ea1b282b28089ceb77f859922559856340f0f2b931d45844c832d6b1ebc84a2dd3d054d172c9241893a1a34951514b6aa4123065ac9ddea1aea", 0x6f}], 0x2, &(0x7f0000002980)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x20000000}], 0x6, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000002b80)={0x3, 0x1, 'l'}) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffd22, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x200000000002) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 856.019145] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = fcntl$dupfd(r1, 0x0, r0) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x8, 0x0, 0x0) 18:27:12 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0xffffffffffffffff}) 18:27:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000140)=0x54) accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x800000000000000, 0x0) 18:27:12 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x100000000000000}) 18:27:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x8dffffff00000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x1000000000000000, 0x0) 18:27:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = dup2(r0, r0) r2 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, 0x1f, 0x700, 0x70bd2c, 0x25dfdbfc, {0x10}, [@typed={0x8, 0x59, @uid=r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r3, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:12 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x200000000000000}) 18:27:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f0000000080)=0x100, 0x8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="1449578c05e381e5b3b60ced5c54dbb7dd1dc7430d224573a2995ae200a5fb215976b477c856759a", 0xffffffffffffff5e) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) read$FUSE(r2, &(0x7f0000001340), 0x1000) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="e0000000000000001701000002000000ca00000062b125b2601d5de89838ce1b5d643762359d062d372e87052519f0952b7b9fe1df5e05fa7d3ff704a15847f37f3641a0b2b36288fdc1ae8f4b4351adedc1809f2278368636ce441b2c15601f8b8eb16ae0d5c1c61f7b720ef6f751a9336e5260f45d73b16deb1962e7b47b5f60a4a8d4eb85c15b1a40d8bddc15d1cd7592e2b8649feb655cc1da46475a2d6434599312fff2b2d907d3d4c5e8794bd1f3a6fd61a430078cbe9aa58a7976eb04e0cfa128222d5b688d62fddc4903ae2ff6534a94695f3652339987f6b73900006e911ed0075616ef374169507ce23bf369dfa2f70aeed025506d7462f653e28a79ba5cf323e19d937369"], 0xe0}], 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x111881, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x8000000000000000, 0x0) 18:27:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x8000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x1000000}) 18:27:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r3) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40, 0x0) mkdirat$cgroup(r4, &(0x7f0000000080)='syz0\x00', 0x1ff) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x8000000, 0x0) 18:27:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x2000000}) 18:27:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x10000000, 0x0) 18:27:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f00000001c0)={0x49, &(0x7f0000000140)="cbf07d8b220ad251e85385536111c051ec3237c21555ed2a097a15889650b1e3d87afe79bc76a27ab4d65bd6296d4a9138edd30f5b6036c7a547c29be3b8495f26176a2b12eb93ff54"}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80), 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="7fffff000000000000e1a3790f421288f02816cc9f000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 858.332640] device bridge_slave_1 left promiscuous mode [ 858.338224] bridge0: port 2(bridge_slave_1) entered disabled state [ 858.387019] device bridge_slave_0 left promiscuous mode [ 858.405433] bridge0: port 1(bridge_slave_0) entered disabled state [ 858.577206] team0 (unregistering): Port device team_slave_1 removed [ 858.598698] team0 (unregistering): Port device team_slave_0 removed [ 858.619282] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 858.640895] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 858.725186] bond0 (unregistering): Released all slaves [ 859.160710] IPVS: ftp: loaded support on port[0] = 21 [ 860.304370] chnl_net:caif_netlink_parms(): no params data found [ 860.686544] bridge0: port 1(bridge_slave_0) entered blocking state [ 860.693675] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.700748] device bridge_slave_0 entered promiscuous mode [ 860.735962] bridge0: port 2(bridge_slave_1) entered blocking state [ 860.742590] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.750343] device bridge_slave_1 entered promiscuous mode [ 860.845969] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 860.882804] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 860.979357] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 860.987454] team0: Port device team_slave_0 added [ 861.018060] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 861.026107] team0: Port device team_slave_1 added [ 861.055994] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 861.092481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 861.213039] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 861.245345] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 861.563248] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 862.733318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 862.845283] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 862.957158] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 862.963770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 862.970814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 863.082965] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 863.089097] 8021q: adding VLAN 0 to HW filter on device team0 [ 863.200872] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 863.208037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 863.216588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 863.231505] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.237917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 863.252621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 863.344051] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 863.351664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 863.359700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 863.368014] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.374461] bridge0: port 2(bridge_slave_1) entered forwarding state [ 863.473639] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 863.480547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 863.596341] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 863.604434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 863.718721] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 863.725991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 863.735717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 863.743906] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 863.851423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 863.858609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 863.867168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 863.973767] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 863.980612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 863.990096] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 864.095109] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 864.102142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 864.110318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 864.649231] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 864.870270] 8021q: adding VLAN 0 to HW filter on device batadv0 18:27:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x2000000}) 18:27:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x8, 0x0) 18:27:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x80000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000280)={r2, &(0x7f0000000200)=""/74}) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000008a916ed2fe0a260600000000000000000000000000003d00000000000000000047e220270000000000000013380000000000000000000000000000000000000000000000000000c8a9000800000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r3, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)}}], 0x1, 0x0, 0x0) 18:27:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x10000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x5, 0x8}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000000c0)={r4, 0x2, 0x2}, 0x8) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 865.021331] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="23a882c465f1472c88ec01d84f964e056f6e895aa9690b5e82df788c1d9e6a4da3a9f4ca1fdabb22a52ced664d51c251c6bfcdffca403403095ea7db2a2332e70fd797d72887c9c143d03145b34c34b40334224d67a2dddbbc762574f8e5dfbdf5a4f79e40d51940a17acef8adc643d975fa00190e9491b5783ef7bb5e59e3ce132d43e73ce6f791ddfb02b3f743c69ae762e630462cb4aae0fc71374fd24600bdce", 0xa2) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x1000000}) 18:27:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x10, 0x0) 18:27:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 865.147764] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(0x0, 0x0) creat(0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/fib_trie\x00') preadv(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/45, 0x2d}, {&(0x7f0000000440)=""/221, 0xdd}, {&(0x7f0000000300)=""/5, 0x5}, {0x0}, {&(0x7f00000001c0)=""/30, 0x1e}], 0x5, 0x400000a) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0xfffffffffffffffe) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) close(r3) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(r1, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x20, 0x4) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) [ 865.288666] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) set_robust_list(&(0x7f00000001c0)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x7, &(0x7f0000000180)={&(0x7f0000000140)}}, 0x18) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x2}) 18:27:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x78, 0x0) 18:27:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 865.498525] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 865.653816] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a070400000081e5b3b60ced36a896d8", 0xfffffffffffffd78) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000280)={r0}) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000e5ffffffffffffff0000000000000000000000003800000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000516d55c4001000000000000000800000002b010ae7feae"], 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x1) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f00000000c0)=0x44) 18:27:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x7800000000000000, 0x0) 18:27:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0xffffffffffffffff}) 18:27:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x8dffffff}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 865.763606] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x7b4e1357, 0x40) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="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", 0xff34) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000340)={'NETMAP\x00'}, &(0x7f0000000380)=0x1e) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f00000001c0)={0x6, 0x8, {0x54, 0x7ce8, 0xa5, {0x6, 0x80}, {0x8001, 0x5000}, @rumble={0x80, 0x80000001}}, {0x53, 0x20, 0x6, {0x100000000, 0x9}, {0x7ff, 0xb4}, @cond=[{0x0, 0x9, 0x452733e2, 0xfecd, 0x4, 0x6}, {0x8, 0x2, 0x101, 0xeb, 0xa2, 0xfffffffffffffffd}]}}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x288203, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000000c0)={0x7, 0x198fc4ee, 0x101, 0xaa, 0x100000000000000}, 0x14) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000080000000000000000000380000000000000000000000000000f0ff00000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x100000000000000}) 18:27:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x78000000, 0x0) 18:27:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x400, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000200)) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000180)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f00000001c0)={0x3c, @remote, 0x4e20, 0x1, 'wlc\x00', 0xa, 0x100000000, 0x29}, 0x2c) r4 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x8000) write$evdev(r4, &(0x7f0000000080)=[{{}, 0x17, 0x400, 0x2}, {{0x77359400}, 0x15, 0x80000001, 0x8}, {{0x77359400}, 0x7, 0x5a3670a8, 0x5fe}, {{0x77359400}, 0x15, 0x20, 0x12}], 0x60) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 865.980444] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x7800, 0x0) 18:27:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x2543f41f4d87e600, &(0x7f0000000080)=""/7, &(0x7f00000000c0)=0x7) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/netlink\x00') accept4$inet(r2, &(0x7f00000003c0)={0x2, 0x0, @remote}, &(0x7f0000000400)=0x10, 0x80800) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000380)={0x4, {0xffffffffffffffe0, 0x9, 0x5, 0x6}}) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$sndseq(r3, &(0x7f00000001c0)=[{0x1ff, 0xb16b, 0x1, 0x1000, @time={0x77359400}, {0x66, 0x8}, {0x2, 0x3}, @connect={{0xffffffffffff90d3, 0x10001}, {0x9, 0x9}}}, {0xffffffffffffff91, 0x3, 0x8000, 0x0, @time={r4, r5+10000000}, {0x9, 0x788}, {0x844e, 0x80}, @raw8={"a561e227f7acdcd3296cc3fa"}}, {0x35, 0x9, 0x3, 0x40, @tick=0x2, {0x735f, 0x10000}, {0x25, 0x3}, @raw8={"4d320ffc5dad619929cf07c9"}}, {0x81, 0x1, 0x1f, 0x3e0, @time={0x77359400}, {0x1, 0x3}, {0x7, 0x81}, @raw32={[0x1, 0x3, 0x101]}}, {0x8, 0x9, 0x401, 0x8, @time, {0x7, 0x6}, {0x7fff, 0xfffffffffffffffe}, @note={0x4, 0x2, 0xfff, 0x6}}, {0x2, 0x8000, 0x0, 0xffffffffffff8001, @tick=0xfffffffffffffffa, {0x9, 0x1}, {0x8a5, 0x200}, @raw8={"951ccda10e807d62ee678af9"}}, {0x8, 0x3, 0xbe, 0x8, @tick=0x7, {0xfffffffffffffffd, 0x8}, {0x4, 0x1}, @time=@time}], 0x150) 18:27:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x200000000000000}) [ 866.167193] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xf0ffffff}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r1) r2 = fcntl$getown(r0, 0x9) r3 = getpgrp(r2) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x800) fcntl$setownex(r4, 0xf, &(0x7f0000000040)={0x0, r3}) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(r5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x13, 0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000640)=""/168, &(0x7f0000000180)=0xa8) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[]) ioctl$NBD_SET_BLKSIZE(r5, 0xab01, 0x5) socket$netlink(0x10, 0x3, 0x10) 18:27:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:22 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0xffffffffffffff71) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000"], 0x70) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, 0x0) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000fb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c9ba35eb45207d6d8eb62f6009fa7f85af109f0050194c90e26ed36974306baf05ae09315dad57b5abac7ffff9424219dcdaa77db1b971bf072bd952cb067e1e6ea9"], 0x78) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000140)={0x1f, "1fcf4b8003fd02401ae85b891a593af6fde80cea483b2d974ec12a77cea11133", 0x20, 0x30000000000, 0x2, 0x4, 0x4}) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)}}], 0x1, 0x0, 0x0) 18:27:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x2}) 18:27:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f00000000c0)={0x4, 0x7ff, 0x2, 0x5}) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 866.404890] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x3) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f00000001c0)={0x15, 0x80000000, 0x5, 0x1}) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x200000000000000}) 18:27:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000004f89a333772606971b00000000000000000000ecffffff00000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 866.617349] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x7b010000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x100000000000000}) 18:27:23 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x600000, 0x184) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1, 0x2000) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460004000300000000000000400000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f00000000c0)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000140)=r2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r3, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000180)={0x1, 0x0, [{0x2, 0x0, 0x1}]}) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2040, 0x8) getsockopt$TIPC_NODE_RECVQ_DEPTH(r4, 0x10f, 0x83, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 866.897732] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x1000000}) 18:27:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x4ffa, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, 0x32, 0x829, 0x0, 0x0, {0x4, 0x40000}, [@nested={0x4}]}, 0x18}}, 0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f0000000040)) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000b90dbad000000495ed62b9697109729c5789bb94d00000000000100000000001b0000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000150000000000000000000000000000000000000000000011000000000000000000000000000000c750852edbe219fc8fe0919f956445fddc627ab1a8533295e5af3093299c254166098c7b92667953c27c51c6b4a60ec0df43b91e7d19151a"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80800, 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000400}, 0xc, &(0x7f0000000100)={&(0x7f00000012c0)={0x1030, 0x9, 0xb, 0x904, 0x70bd27, 0x25dfdbfc, {0xc, 0x0, 0x9}, [@generic="d38409e71022b9221f5c9618e39a9b9383ab3963c076", @nested={0x1004, 0x29, [@generic="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"]}]}, 0x1030}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 18:27:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000180)) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC], 0x14) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x10000, 0x0) connect$caif(r2, &(0x7f0000000140)=@util={0x25, "9921b828c239500239ab80306bf384ad"}, 0x18) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 867.058779] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 867.107234] openvswitch: netlink: Flow set message rejected, Key attribute missing. [ 867.156162] openvswitch: netlink: Flow set message rejected, Key attribute missing. [ 867.193846] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x200000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x2}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x100000001, 0x101000) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f00000000c0)={0x2, 0x2}) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x2000000}) 18:27:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 867.416663] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000200)={0x1, 0x2, @raw_data=[0x1, 0x6, 0x2, 0x1, 0x800000000000000, 0x6e8c, 0x0, 0x8, 0x40, 0x5, 0xbcc, 0x2, 0x4000, 0x1, 0x1, 0x8001]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="00454c461181000000000000000000000000000000000000000000000000000000003fff1ee00000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"], 0x78) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @loopback, @dev}, &(0x7f00000000c0)=0xc) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 867.568223] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x80) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000140)={0x1, {{0xa, 0x4e23, 0x10001, @remote, 0x20}}, {{0xa, 0x4e24, 0x7ff, @remote, 0x80}}}, 0x108) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0xffffffffffffffff}) 18:27:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000180)={0x3fc5, "a8f889703374c9714dcad55a61ff9ba9e577b09ecd285e62ce81064462a7cec2", 0x3, 0xffffffffffffffff, 0x6, 0x400000, 0x4000030, 0x8}) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xffffffffbdc8cfbe, 0x2) connect$rds(r2, &(0x7f00000000c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x0, 0x0) bind$tipc(r1, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x2, 0x2}, 0x4}}, 0x10) write$binfmt_elf64(r3, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) lseek(r3, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x7fffef05}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[], 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xffffffffffffffff}) [ 867.802708] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000b22b8df22798c95053a1000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000038000000f46fbab691064474dc16000000000000000000000000000000000000000000000000001df300000000000000000000d0547d00000000000000927d00000000000000000000000000261069e5e8baa9ab4510b6d292647997b96edf6fb882ceab88da1a4ba59c5675d1b09c03f6211e457eea852c74b4f0aca776238b2ced175998426be762fd27"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18, 0xffffffffffffffda, 0x3, {0x1}}, 0x18) 18:27:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x40}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000180)={r3, 0x4f, "22ad238ab9a2f9f58d85bfc8eb43865f1723e1159c0dcb05b87665acdffd1cece9b0a107f232757ef095b20371d02e78a17414f7770e6b5c76a5cbe3562e7d1c211484be80a987b9cb67f194cb81d9"}, &(0x7f0000000200)=0x57) [ 867.978885] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x200000000000000}) 18:27:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) r3 = fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(r3) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b00501020000dd9c7d1f", 0xd) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000000c0)={r2, 0x0, 0x8, 0x750, 0xfffffffffffffaf3}) recvmmsg(r1, &(0x7f0000000140), 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000140)={'nlmon0\x00', 0x9}) 18:27:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) pselect6(0x40, &(0x7f0000000280)={0x8, 0x1, 0x80000000, 0x7, 0x5, 0x3, 0x0, 0x4}, &(0x7f00000002c0)={0x1, 0xff, 0x1, 0x80000000, 0x2, 0x8, 0x6, 0x9}, &(0x7f0000000300)={0x7fff, 0x0, 0x80000000, 0x3da, 0x21, 0x5, 0x6, 0x6}, &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380)={0x4}, 0x8}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x200000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000680)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000540)=0xffffffffffffff25) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000580)={{{@in=@empty, @in=@loopback, 0x4e24, 0x0, 0x4e22, 0x1, 0x2, 0xa0, 0xa0, 0x0, r3, r4}, {0x3643, 0x3, 0x8, 0x3, 0x0, 0xffff, 0xfffffffffffffffa, 0x6}, {0xc2, 0x2, 0x7, 0x5}, 0x3, 0x6e6bbc, 0x2, 0x1, 0x1, 0xa968325075abc918}, {{@in=@multicast2, 0x4d5, 0xff}, 0xa, @in=@rand_addr=0xb6e, 0x34ff, 0x0, 0x2, 0x100, 0x9, 0x6, 0x1}}, 0xe8) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r5 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xfffffffffffffff9, 0x4000) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40004}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r6, 0xb04, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x5}}, ["", "", "", "", "", ""]}, 0x24}}, 0x48010) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00000000c0)=0x1000) recvmmsg(r1, &(0x7f0000000440)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x0, 0x160, 0x0) 18:27:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x100000000000000}) 18:27:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x20000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 868.335025] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1000000}) [ 868.433458] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e681e5b3b60ced5c54dbb7", 0xfffffffffffffe5a) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'ip6gretap0\x00', 0x2}, 0x18) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x100d6f48, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x200301, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f00000000c0)={0x0, 0x0, 0x103, 0x1, {0x3, 0x9, 0x6417, 0x3}}) 18:27:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 868.566533] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 868.753228] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x5, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) 18:27:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000001000000000000000000000000000000000000000000000000000000000000000000000000000000b600004000000000000000000000000000000000000081a7a8bf0b259d705a4d5be214a6c98e3eea2d8708a5dad8caf51cbbfbcba416fccf04e8d3cdb74b21bfecfb89c634607e450df2f7e7fed3859c950beae91ec728b9320f1e99b914abaef6591feacfde67c820e2ddc6024003d779d5cde8ee9bf410c7e0b4954bbf28a767389770"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2000000}) 18:27:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = dup(r0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000180)={0xfffffffffffffffb, 0x21599738}) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x8001, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000400380000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000010000000000000"], 0x78) recvmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000001180)}}], 0x1, 0x8000000, 0x0) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000340)={0x8, 0x6, 0x0, [{0x101, 0x8, 0x7, 0x3, 0x80000000, 0x5, 0x6}, {0x6b6f, 0x400, 0xfff, 0xcd, 0x8, 0x8000, 0x5}, {0x1697, 0x2, 0x3, 0x0, 0x80000001, 0x0, 0x3}, {0x4, 0xb7e, 0x40000000, 0x4, 0x1b, 0xf07, 0xff}, {0x4, 0x4, 0xc985, 0x200000000000, 0x1, 0x40, 0x7}, {0x400, 0x7fffffff, 0x100, 0x7f, 0xffffffffffffff47, 0x4, 0x401}]}) 18:27:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x4000000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 868.892119] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="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", 0xfd) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180), 0x1, 0x0, 0x1fb}}], 0x1, 0x0, 0x0) 18:27:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2}) 18:27:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x7, 0x80) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000002c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e23c6991a9c04d9060e04a30ec9d6c9ed6c64f7c8469645b54e845f2e5dcfa663fc9aba897e982eb8b716dcee353f1ff709282e0c68e571f05a9b2d166b3d6efbe60401374d9d97df7b6eb70eaccb6670c9999972106298a679b52d9357c80641565b55f2e"], 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f00000000c0)={0x2, 0x6ce5, 0x37f0, 0x2, 0x1, 0x8}) [ 869.068876] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) init_module(&(0x7f0000000140)='skcipher\x00', 0x9, &(0x7f0000000180)='ecb-twofish-avx\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="cbcc497516e0c127a6bc4ae607364c9ebc8f37fa2e89b3b3c5508fb4766b242823dfda052371ebd576a14fcde968efdac560ffc0a7b44a9585922aab2974021777be998c680afe3389d5725d29f4d8d569bfe5a00db9e1bff6069c152f5b311c332f133341d28bcfdceed32a1d96ccaf", 0x70) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 869.320805] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r3) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) r5 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000140)={@loopback, 0x0}, &(0x7f0000000180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'veth1_to_hsr\x00', 0x0}) accept(r1, &(0x7f00000005c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000006c0)=0x14) getsockname$packet(r2, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000980)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000940)={&(0x7f0000000780)={0x18c, r5, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r6}, {0x12c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}]}}]}, 0x18c}}, 0x814) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:25 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x282, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x5c3a) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x4, 0x10}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r2, 0x8}, 0x8) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0xfffffef4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, r2, 0x320, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffc}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x18}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x26c6ee35}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xd11}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbb31}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x40800) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, 0x0, 0xffffffffffffff5d}}], 0x1, 0x0, 0x0) 18:27:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x2}) 18:27:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x100000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x9c, r2, 0x608, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x10000}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4810) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r3, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 869.513464] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 18:27:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000009c2226a2eb776ac03dca420c018557b0a9"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0x8e}], 0x1}, 0xfffffffffffffffe}], 0x16a, 0x0, 0x0) acct(&(0x7f0000000080)='./file0\x00') 18:27:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x84a00, 0x0) connect$bt_rfcomm(r3, &(0x7f0000000080)={0x1f, {0x0, 0x3, 0x2, 0x2f, 0x0, 0x8000}, 0x3}, 0xa) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) ioctl$VIDIOC_S_SELECTION(r3, 0xc040565f, &(0x7f00000000c0)={0xd, 0x1, 0x1, {0x4, 0x1, 0x0, 0xb228}}) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @multicast2}}, [0x100000001, 0x9, 0x80000001, 0x63f40d4, 0x6, 0x2, 0x8, 0x0, 0x2, 0xfffffffffffffffe, 0x8e, 0x4, 0x8, 0x9, 0xebf1]}, &(0x7f0000000080)=0x100) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e24, 0x6, @mcast2, 0x5}}, 0xffff, 0x66ad}, 0x90) 18:27:26 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 18:27:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60cdbb7", 0xd) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xf0ffffff00000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x8, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000140)=0x3, 0x4) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYRES64=r0], 0xffffff1e) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000200)={0xb, {0x6, 0x1, 0x2, 0xfffffffffffffffb}}) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000001c0), 0x4) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r4 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x7, 0x28000) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) 18:27:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x92, 0x7, 0x8001, 0x9, 0xfffffffffffffe00, 0xfffffffffffffffc, 0x540e, 0x891, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000180)={r2, @in={{0x2, 0x4e22, @multicast1}}, [0x0, 0x4d8, 0x5, 0xfffffffffffffe01, 0xfffffffffffffc4a, 0x2, 0x3, 0xff, 0x3ff, 0x8000, 0x2, 0x68, 0x100, 0x6, 0x60c6]}, &(0x7f0000000280)=0x100) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r3, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)=0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000340)={r5, &(0x7f0000001340)=""/4096}) prctl$PR_SET_PTRACER(0x59616d61, r4) 18:27:26 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 18:27:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000b00)=0x1c, 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000011c0)=[@in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e24, @multicast1}], 0x20) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) fsetxattr(r1, &(0x7f0000001200)=@random={'user.', 'ecb-twofish-avx\x00'}, &(0x7f0000001240)='ecb-twofish-avx\x00', 0x10, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002340)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="03358d4f0d39f589907a8e713ac776ae0963d075096d80adf1b159"}, {&(0x7f0000000140)="7505f52dbb92031737f2ea35a56c385704da83fd9046473bca448100bc619a522f867dea0afe53eebf2d453fb37f187d112dddf80788809e5a3039944738e853880a9bbe"}], 0x0, &(0x7f00000001c0)=[@assoc={0x0, 0x117, 0x4, 0x6}], 0x0, 0x10}, {0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)="fa59a958a4ab3b7aa7f5f36d75ea8249f21ccaca242bdb614c5bff8f78555184dfe8b673687f1b3e6e09d439e5810980f4ec5e051dd041c663cb42239d6b846fb41f30eeaa75cfdd7c9aa85397080e4915009f394368c302d5a6ad15952ff8a2bb4553267ad1abdc42291c11cbd3b11f62e4f8d7899a9f1975f85f717cc8dbd2bb0ef56daf5e9b30996a79bf29d3be3f203a0e7ee7548e0f9896d3cdb6217a665463611154c31ac6f1f0184ffdf0ba66fa1624e41f22d7763b3e619933a69d3b94f94c0666f3e9cac3c1eb2489d023fb303ec6470ed74507576c0a527bc74a1014f99f3967"}, {&(0x7f0000000300)="a6415be0"}, {&(0x7f0000000340)="f0fc73ad2340e3441de67011367f9afc38c455490b0171a74d973085640fb770d3aa583e346d73ce47fdab99c3b06129e199ac00d570921a469423674f1a792a074fba10fe6a41ff302deac5083f4221e70963f39d0e3ee8"}, {&(0x7f00000003c0)="ceef6841a27d187561274eced25fd1d7328cac05228272cc609a76023ef3fc0a09ca1eed0a805fb459bc912517e2c369"}, {&(0x7f0000000400)="299860e90678995591bbd81d21d5e7ef422d4c8f2b5b9d04b88647a665fb1a3038f0bf242e337aeb6eed898b15bdf5f403f046eaa653"}, {&(0x7f0000000440)="467176b793a3d3b6c47172b3c52d03eaac379333ee3052a9c4a87d38807bfd24d94923f6e9866e9f6584d803e48c50f0b78f84e2ca7d6e7ffcd75f223394c2f75a5776e008d18f206c286606e02ed032949dada5b4873c74c7b8cac86c80fdeba74db9d0888a3f92b40019f2930978ef748ba898fdc8492d4c33dfed9bc003b6d2cec6ada0797cf872328fcf596a2fa4d64668163e4e12da00e41f76edfda31565255f3d67bdf722279cd6c1ce06d389497955c445a8772e4f159e3d9685c552648b4efb99811f7072ea681528c13bac6485ec"}, {&(0x7f0000000540)="5c3faa8d4c470b956a97571ea35f44725374b1e26bc0190612d39502e14eb993223f8205bfc36877e2af70c32f392b5325eda5ac8c3dcccdc45caf899a93c85e7684d626566a8a4fc8a3032230f3a46bf82e7c7fb672a530da985472b39db512592cdf86bee681cce0df004f2657af819ee9e5503bc1338758ddbd4b"}], 0x0, &(0x7f0000000640)=[@iv={0x0, 0x117, 0x2, 0x0, "86663f8aebff50a8a9cfdb0f3fe82ddab05cb117ced273e7b56b0fa5f4125a628de53fe03aa1e0bdf6ccf7b2ea7990933e612c7f2602a0ccba7810218eb782d5e86fa53df39a4e74c1bc"}, @op={0x0, 0x117, 0x3, 0x1}, @iv={0x0, 0x117, 0x2, 0x0, "c5396982ee6f4b62fd55e4a2777467f5d2f414"}, @iv={0x0, 0x117, 0x2, 0x0, "a1d04625ee88f509a010e9c19f130718e098f9aeb64bb4fb4977c1a5781493033bdc9270b1a0e2bf7e27b4f140e519d3531fc74f714facb4f5f2c958cde767d4e43367da14db669945c2f4d1205ede7a21a26dcd39034940306d0560e5f95df3db3e72f2326eff880fe5c02cce04e0e0837b204305da94ad267a"}, @iv={0x0, 0x117, 0x2, 0x0, "0faae960e0fbd8afb7e64b49eb03b4f2606d"}, @op, @assoc={0x0, 0x117, 0x4, 0x400}], 0x0, 0x8000}, {0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000001340)="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"}, {&(0x7f0000000800)="703b50dd42ecbb9a93cb699dda41bd3cbbde70d50749ccf2b1bc256485f52ae06ec5aec335df65f3e14a2abc4cec7968a3cf1a44cc8972ea31c9f9916d5c031a5fcc69826bd88f8c0cb51299c22e682d80501cafb4ea31ca88f9886a70c9df07f20fe72abc89974a76b17991c89a00f142e227"}, {&(0x7f0000000900)="7efac943cf53e42e87ff4556f85673762949c565e0b823eeebe792d6a97a9f6cadb22ea7867e84d5942602a013f8fe9a1e2909b61a35cf211dd772d5eabb4369b7fd4e6111be4905167273bff9d74ef5386523cb372a6b72bcb72149349f8e64022909735e5404d47c03e6672284029649d970d3d34f8cb2422d9ecb4eda6d32ad3dd6c258e78cac0269efbc5cab944c8d2852b5ec3ddf6dc150fb9873f9f30a4882d4435ba4b4fd7d328081ef872a4373b6a3ae1064a8728206da8848fd8367c23cf1815a86c70008021aff4f59f13e37df37e1f4d2a3bf3a126d3eef17"}, {&(0x7f0000000a00)="98e54c522383c0961af28e6f0b50dbaee11a4f58d8154e5d0bbcc9f9122065833946236a95760fa3ef37bd9c5cb99b57e7277e8cc30b0a444fa8758d9bfbe9a9553af7bb65fd4b0f3e8517f5eb3bb08c91fbd69612a0b8248215b548fab0"}, {&(0x7f0000000880)="9ba1c169803885248ebaa0c6a65d727abee42c03db4dd4536bc2625eed63e421525eabda21"}], 0x0, &(0x7f0000000b00), 0x0, 0x4000000}, {0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b40)="cb45b0bad8b0ac3538731decaffcfd96a517"}], 0x0, &(0x7f0000000bc0)=[@op, @assoc={0x0, 0x117, 0x4, 0x7}, @assoc={0x0, 0x117, 0x4, 0x7}, @iv={0x0, 0x117, 0x2, 0x0, "dd3b3d18f87b7b3f9b0e81d16628e2235233859128de0b1ab0b31e051b0ec9243412375936239b9b72b34efb06e81e9c7749b67eb3acf0832b82313a3f6086bf55c5b465b1c82c7db48d966a3532225d33aa4dbe1b31032338f1644fe92c6440fd52f8636476541dcd5f9d40b3decd402fccd06b8c2ff18559"}], 0x0, 0x20048085}, {0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000cc0)="210ff91f0e25a31c12f7f8738a76b60b4d917d9466798f8fa1c7aad66c7a148a844107dc7fc01791fddf048348b5ead614328a03812ac806b50a8ba525573cbe8d371131624c19a96418d6d517aca9873216cec90de1b7fed6e63656ff9ec8b951c335906dd6afd54b6b1b87cd25064cbf4c67edd4807e196eaac095b3e6c38ecfe50ef1a7eb51fb36ef4770b3a5bfdab8fcd19a9fda747cb931b7420d44ba267d5920e345271b7a5ade38bae475e28722"}, {&(0x7f0000000d80)="60c91514055821df9ec102458922cb0c8828448211104615baa5074283a8149fe4ad2e43c1b80f3c4ca60d34bff39e2ae2737ed3e7eb8fbac8d3710eaea55c505047095419691097b4c24ae6def7a7b889f292460eabf3a61d0bbd6aa6f3b3b9592193e10b295f96d2235c025d70143e2a806b1efeac1785854e9564e35d57553a8b7de08b0f00690682fc0e41a9a999a7716185a212c426fc0d7f"}, {&(0x7f0000000e40)="431b76b2f48e36ff13bf7e6de7a04297141ad94b66cff4c222e6e2919a9f4f6464edb4efec651d451c86fbf3c0a80e29cd9f72f90e38ba35511e082da4a7bad2c05bc5fa57135d95ddaa55d5f71d85921d"}], 0x0, &(0x7f0000000f00)=[@assoc={0x0, 0x117, 0x4, 0x7}, @iv, @assoc={0x0, 0x117, 0x4, 0x6}, @op={0x0, 0x117, 0x3, 0x1}, @assoc={0x0, 0x117, 0x4, 0x1}, @assoc={0x0, 0x117, 0x4, 0x3}, @assoc={0x0, 0x117, 0x4, 0x6}, @iv={0x0, 0x117, 0x2, 0x0, "45eac3655c7b8c8c86b1c926d8a8ab8b37f21733c06ba0c329ecffc41250cebdc25ff4abd8090b862b2d7c216d1596c3f9c89afe8708c65993c337f485253e7d670d4fa7f7f8d7d7705aaaa2289fd81510ed046f51fd3d2d82cec487abeb8ad5553c7c78ce8375013453e4ecd517c12b9785065ce86dba0186c26b066dedf92b9911ee30b3870af8f0ad85bfa0cb4470524119ce07852e739e3634793532bf2c7b9368db08969e988e60f71c1fe05740e3aecc"}], 0x0, 0x800}], 0x4924924924925b9, 0x0) utimes(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)={{0x77359400}}) write$binfmt_elf64(r2, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f45f84600000000000000000000000000000000000000003e50abfab2ce5b5abe4d0e185b303cbf9cc8db4685dbd8bd000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1000000}) 18:27:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000"], 0x78) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000180)=ANY=[@ANYBLOB="01c67f6c1f7bc8cd1d000040000000000001040000000000"]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) userfaultfd(0x800) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) time(&(0x7f0000000040)) 18:27:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x800000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x2000000}) 18:27:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x0, 0x0, 0x6, 0x5, 0xb, 0x4, 0x1f, 0x6, 0x1, 0x7, 0xed62, 0x8000}) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[@ANYPTR], 0x8) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x10000, 0x0) sync_file_range(r1, 0x6, 0x8, 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2000, 0x0) [ 871.402311] device bridge_slave_1 left promiscuous mode [ 871.409201] bridge0: port 2(bridge_slave_1) entered disabled state 18:27:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x1, 0x2) [ 871.447455] device bridge_slave_0 left promiscuous mode [ 871.475910] bridge0: port 1(bridge_slave_0) entered disabled state 18:27:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x7f, 0x4) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0xffffffffffffffff]}) 18:27:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0xd) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept4(r0, &(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000300)=0x80, 0x800) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r3 = getpid() capset(&(0x7f00000001c0)={0x399f1336, r3}, &(0x7f0000000200)={0x400000000000, 0x3, 0x0, 0x8000, 0x7, 0x6}) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000040d1a92d0f9e6e000000000000000000000000000000000000000000c8fb42ec0000"], 0x78) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x1) setsockopt$CAIFSO_LINK_SELECT(r4, 0x116, 0x7f, &(0x7f00000000c0)=0x4, 0x4) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000340)={0x7fffffff, 0x1f}) 18:27:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x37f) r1 = socket(0x3, 0x806, 0x1) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 871.733406] team0 (unregistering): Port device team_slave_1 removed [ 871.790386] team0 (unregistering): Port device team_slave_0 removed [ 871.829356] bond0 (unregistering): Releasing backup interface bond_slave_1 18:27:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000000c0)=0x3, 0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000044000)) r3 = userfaultfd(0x4000) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r3, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, 0x0) pselect6(0x40, &(0x7f0000000240)={0x2, 0x8, 0xff, 0x1, 0x9, 0x0, 0xffff, 0x102}, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x100000000, 0x1f, 0x9, 0x7fffffff, 0x3, 0x5}, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x5}, 0x8}) mq_timedsend(r4, &(0x7f0000000140), 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, &(0x7f0000040000)) tkill(0x0, 0x15) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040080000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0xd9) [ 871.855380] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 871.977808] bond0 (unregistering): Released all slaves [ 872.512351] IPVS: ftp: loaded support on port[0] = 21 [ 873.439670] chnl_net:caif_netlink_parms(): no params data found [ 873.827646] bridge0: port 1(bridge_slave_0) entered blocking state [ 873.839767] bridge0: port 1(bridge_slave_0) entered disabled state [ 873.847455] device bridge_slave_0 entered promiscuous mode [ 873.926993] bridge0: port 2(bridge_slave_1) entered blocking state [ 873.941261] bridge0: port 2(bridge_slave_1) entered disabled state [ 873.948792] device bridge_slave_1 entered promiscuous mode [ 874.126532] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 874.195950] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 874.383862] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 874.397637] team0: Port device team_slave_0 added [ 874.456704] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 874.465314] team0: Port device team_slave_1 added [ 874.525093] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 874.589251] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 874.825091] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 874.875606] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 875.183457] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 876.280877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 876.385608] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 876.487477] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 876.493945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 876.501687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 876.608756] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 876.615174] 8021q: adding VLAN 0 to HW filter on device team0 [ 876.720881] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 876.728204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 876.737889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 876.745910] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.752691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 876.762489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 876.853274] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 876.860295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 876.868473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 876.876226] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.882654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 876.985005] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 876.992297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 877.099566] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 877.106722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 877.212984] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 877.220266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 877.228909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 877.237124] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 877.334386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 877.341630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 877.349563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 877.470109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 877.477148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 877.487922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 877.585412] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 877.592411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 877.600484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 878.113412] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 878.327702] 8021q: adding VLAN 0 to HW filter on device batadv0 18:27:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)=0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r2) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x100000000000, 0x0, 0x9, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x194, 0x0, 0x0, 0x5, 0x38, 0x1, 0x0, 0x80000, 0xfffffffffffffffc}, [{0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x8000}]}, 0x78) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000080)=""/59, 0x208000, 0x800, 0x5}, 0x18) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x200000000000000]}) 18:27:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x4080, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[0x8]}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) r4 = syz_open_pts(0xffffffffffffffff, 0x20000) ioctl$TIOCGPGRP(r4, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x547, 0x800) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/218, 0xda) setsockopt$packet_int(r5, 0x107, 0x1f, &(0x7f0000000080)=0x4d, 0x4) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000240)) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x40) io_submit(0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xeffdffff}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000a700000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 878.471619] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000200)) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x840}, 0x10) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 878.562932] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000000080)=0x8000, 0x4) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x100000000000000]}) 18:27:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff}) close(r0) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 878.669046] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:34 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0xf957, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clock_nanosleep(0x6, 0x0, &(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002c00)=""/125, 0x7d}}], 0x1, 0x0, &(0x7f00000001c0)) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000280)={0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/loop-control\x00', 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x1) syz_open_procfs(0x0, 0x0) 18:27:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r3) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x4000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f00000000c0)) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000120000004000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000010000000000000000000010000000000000000000000000640b75b50000000000000000000020fc9e5cb767728992fa0f42d4f10eff1c0e101787fed0a6dfced6b39ea30da02e5abac86037951b79499c31"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x1000000]}) 18:27:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 878.850990] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x100000fe}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 18:27:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 878.994292] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x5, 0x101200) keyctl$set_reqkey_keyring(0xe, 0x3) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000003dc35fe4f5844ba80000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000000000000fc8e7dd4d7ce749fbd56b21a185c0000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, 0x0, 0x2a0}}], 0x1, 0x0, 0x0) 18:27:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r3) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0x1, 0x7}, 0x21}, 0x10) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x2000000]}) [ 879.133349] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000004ec0)="1c0775b005e381e5b3b60ced5c54dbb7", 0xe7b6c01966913d4) clock_gettime(0x0, &(0x7f0000003e00)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003c00)=[{{&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/22, 0x16}, {&(0x7f0000000200)=""/194, 0xc2}, {&(0x7f0000000300)=""/198, 0xc6}, {&(0x7f0000000400)=""/212, 0xd4}, {&(0x7f0000000500)=""/68, 0x44}, {&(0x7f0000000580)=""/5, 0x5}, {&(0x7f00000005c0)=""/16, 0x10}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000600)=""/196, 0xc4}], 0x9, &(0x7f00000007c0)=""/31, 0x1f}, 0xfffffffffffffffd}, {{&(0x7f0000000800)=@nfc, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000880)=""/60, 0x3c}, {&(0x7f0000000900)=""/243, 0xf3}, {&(0x7f0000000a00)=""/238, 0xee}, {&(0x7f0000000b00)=""/156, 0x9c}, {&(0x7f0000000bc0)=""/91, 0x5b}, {&(0x7f0000000c40)=""/95, 0x5f}, {&(0x7f0000000cc0)=""/149, 0x95}], 0x7, &(0x7f0000000e00)=""/186, 0xba}, 0x3}, {{0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000000ec0)=""/166, 0xa6}, {&(0x7f0000000f80)=""/125, 0x7d}, {&(0x7f0000001000)=""/20, 0x14}], 0x3}, 0x100000000}, {{&(0x7f00000011c0)=@hci, 0x80, &(0x7f0000001240)=[{&(0x7f0000002340)=""/142, 0x8e}, {&(0x7f0000002400)=""/158, 0x9e}, {&(0x7f00000024c0)=""/4096, 0x1000}], 0x3, &(0x7f00000034c0)=""/152, 0x98}, 0x5}, {{&(0x7f0000003580)=@ax25={{}, [@remote, @bcast, @remote, @null, @bcast, @null, @rose, @bcast]}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003600)=""/103, 0x67}, {&(0x7f0000003680)=""/240, 0xf0}], 0x2, &(0x7f00000037c0)=""/164, 0xa4}, 0x7}, {{&(0x7f0000003880)=@l2, 0x80, &(0x7f0000003b00)=[{&(0x7f0000003900)=""/69, 0x45}, {&(0x7f0000003980)=""/46, 0x2e}, {&(0x7f00000039c0)=""/64, 0x40}, {&(0x7f0000003a00)=""/229, 0xe5}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x5, &(0x7f0000003b80)=""/76, 0x4c}, 0x80000001}], 0x6, 0x40000022, &(0x7f0000003dc0)={r1, r2+10000000}) r3 = syz_open_dev$admmidi(&(0x7f0000003d80)='/dev/admmidi#\x00', 0x1, 0x501000) r4 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r4, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000008000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000"], 0x78) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f00000000c0)=r5) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000004f00)={0x7, &(0x7f0000003e40)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000008c0)={0x1, 0x1, 0x9, 0x8000}, 0x8) epoll_create(0x0) recvmmsg(r4, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x2]}) [ 879.341914] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x7b01}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) 18:27:35 executing program 3: socketpair$unix(0x1, 0x400000000000805, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x8, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60c070054dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000000840), 0x400000000000095, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000140), 0x1) 18:27:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xffffffffffffffff]}) 18:27:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 879.552975] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0xff6b) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) r3 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x17, 0x200001) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000180)={0x2a, 0x3, 0x0, {0x6, 0x9, 0x0, 'cbc(aes)\x00'}}, 0x2a) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={r2, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x7, 0x8, 0x284a, 0x6, 0x1}, &(0x7f00000000c0)=0x98) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000faffffffffffffff000000000000000000000000000000400000000000000000000000000000009ec2b79a92a1955cf7d9e2d9dfae0a000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xd467, 0x400000) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) 18:27:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) fgetxattr(r2, &(0x7f0000000040)=@random={'user.', '/dev/ion\x00'}, &(0x7f0000000080)=""/4, 0x4) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10000, 0x0) ioctl$VIDIOC_G_INPUT(r3, 0x80045626, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x100000000000000]}) [ 879.735665] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getresuid(&(0x7f0000000280), &(0x7f00000000c0), &(0x7f0000000140)) r1 = accept$alg(r0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x2403, &(0x7f0000000180)) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x181, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfffffffffffffdeb}], 0x1}}], 0x1, 0x0, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x7}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000001340)=ANY=[@ANYRES32=r4, @ANYBLOB="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"], 0x1008) 18:27:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x7b01000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 879.949235] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x200000000000000]}) 18:27:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x0) 18:27:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xce1, 0x14080) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000200)=0x8, 0x4) setsockopt$inet6_dccp_buf(r4, 0x21, 0x2, &(0x7f0000000100)="68c6d053a6fbbc9c56a14340693617471f759ceb56fc12f3454fac3d2f4a21b74117b17be3708ef786d74f19307fd782ea61640e78207902be954d5a564c6c3ae3fb753cebbdb980ea57e29c853dde957c11141257cd2cc90cbd8ac1e8208148944866822e64c1badfb13a82442496932f0de7106d090530d2af2b09be4b6be18b04db8b43b18deb16dcffe408d10147289fa0fcc258f0b752875acce600d55f2c77e98c21c546b759000957ea68c938ecbcc9", 0xb3) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) setsockopt$inet6_tcp_int(r6, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x7fff) 18:27:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000080)={0x38, 0x1e, 0xe, 0x13, 0x9, 0x40, 0x1, 0xca}) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f69cf46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038005178b28650f00d3f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000149320f4132ef28e4d25f9462b0d57a1e0c05297f34b333b698fe034ca8177cd8876733c563ae906fe87dff9d804ed2cb5adcd86926c2c8b9de733249cf529d6eaf3288b6df3f6437abcc69968086344af2f457fdda60155ada2108c171971dd8d59d4679429008ee874088ad459f2b0e1b60a6f4780878865a411b652b8"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xeffdffff00000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 880.203158] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x200) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000080)=0x80) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r3) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1000000]}) 18:27:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x44000}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) sendto(r1, &(0x7f00000001c0)="6dcfc68cefe2a53b0d8b74acbcc800b3afe1aa2fa5f8354a51f5145201a1b0bf3e219a53ae6882cf1f805dbb9c4ff4bd767c9e71d6ee16886d0b9a19863c2f159b7d05efd7ad9570e1b79725b03a5df4fd20460dd5f61d62e8f596034dab6534ab5ebc3428e34fd10b5a9ef92dc9fdaf4c5fbb6103e4e047f5d1", 0x7a, 0x408c0, &(0x7f0000000240)=@in6={0xa, 0x4e22, 0x9c3b, @ipv4={[], [], @broadcast}, 0x6}, 0x80) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000000c0)=0x44) 18:27:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 880.357293] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) eventfd(0x48e) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x2000000]}) [ 880.477785] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)='ecb-twofish-avx\x00', 0xfffffffffffffffa) r2 = request_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='ecb-twofish-avx\x00', 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x3}, r2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r3, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x101100, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000300)={@loopback}, &(0x7f0000000340)=0x14) 18:27:36 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace$setsig(0x4203, 0x0, 0xf957, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clock_nanosleep(0x6, 0x0, &(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f00000002c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002c00)=""/125, 0x7d}}], 0x1, 0x0, &(0x7f00000001c0)) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='syscall\x00') preadv(r2, &(0x7f00000017c0), 0x3ba, 0x0) fcntl$getown(r2, 0x9) unshare(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000280)={0x7, 0x0, 0x0, r0}) fchown(r0, r3, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/loop-control\x00', 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000c80)=ANY=[@ANYBLOB="ffffffffac1414bb000000ff00000000ffffffffffff000000000000000000000000000000000000ffffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ffffff00ff000000000000000000000000d1ac00cc53290006010169726c616e3000000000000000000000687773696d300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000f0001802000000000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000010000000000000000010000000000000073797374656d5f753a6f626a6563745f723a6c645f736f5f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac1414aa00000000ffffffff000000000000000000000000000000000000000000000000ffff000000ff00000000000000000000aaaaaaaaaaaa000000000000000000000000000000000000ff00ff00000000000000000000000000062e000300050001bc1300097465616d5f736c6176655f3000000000766c616e30000000000000eeff00000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac1e00017f0000010f000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000008b6c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) syz_open_procfs(0x0, 0x0) 18:27:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xc}], 0x1, 0x0, 0xfffffffffffffe50}}], 0x1, 0x0, 0x0) 18:27:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x2]}) 18:27:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x5efff7f00000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 880.807872] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000140)=0x8, 0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x2]}) 18:27:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 880.971439] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 881.099043] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) sched_getscheduler(0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x84200) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0xdc, 0x4, [0xcdfb, 0xcbf, 0x3, 0x1]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r4, @in6={{0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x30}}, 0x81, 0x7}, &(0x7f0000000200)=0x90) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = request_key(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000140)=',{%,,*', 0xfffffffffffffffb) keyctl$describe(0x6, r1, &(0x7f0000000180)=""/23, 0x17) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c46000e0000000000000000000000000000400000000000000000000000400000000400000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x4000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, {0xa, 0x4e22, 0x0, @ipv4={[], [], @rand_addr=0x6}, 0x4}, 0x3, [0x4, 0x8000, 0x800, 0x9, 0x2, 0x200, 0x80000001, 0x70000000000]}, 0x5c) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp\x006\xafeKt\xc5\x84DH\xea\x01\x007\xfd\x01\x04\x00\x00\xe6\x93\x84)`##\xa6\xd2f\x97\a') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 18:27:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0xffffffffffffffff]}) 18:27:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 881.262391] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x100000000000000]}) 18:27:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x20000, 0x34) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000000200)={0x400, 0x5}) r3 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x1e, 0x10, 0x70bd25, 0x25dfdbfb, {0x15}}, 0x14}}, 0x20000000) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 881.432682] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced7654dbb7", 0xfffffffffffffd8d) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000080000000000000000000000000000000038000000000000000000000000000000000092b0b17a52c82fe2039dfd000000000000000000eeffffffffffffff00000005150000000000000000000000000000000000000000000000000000e16a9bacf95517029494cb0ec6da873de1304ac827e39a3f25865f4b84036b7b548f1f870037e8"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000080)={0x9}, 0x1) 18:27:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) [ 881.613254] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8001, 0x2) r4 = getegid() ioctl$TUNSETGROUP(r3, 0x400454ce, r4) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_GET_API_VERSION(r5, 0xae00, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x200000000000000]}) 18:27:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xffc99a3b}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c4400000000200c14f9b254b71e00000000009a0cf66a6aa22fc300000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:38 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x2000000]}) 18:27:38 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:27:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 881.920170] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3f, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000140)={{0x7, 0x7, 0xfffffffffffff801, 0x2, '\x00', 0x5}, 0x0, [0x100, 0x4, 0xffffffffffffffff, 0x6, 0x7, 0x4, 0x1f, 0x9, 0xde8, 0xffffffffffffb1cc, 0x7, 0x9, 0x8001, 0x4, 0xffffffff00000001, 0xdd, 0x4, 0x1, 0x9, 0xab2, 0x1, 0x2, 0x2, 0x8, 0x4, 0xd280, 0x1, 0x7, 0x100000000, 0x5, 0x8, 0x80000000, 0x6, 0x1fb, 0x2, 0x8, 0x40, 0xfff, 0x7, 0x0, 0x8, 0x5, 0x40, 0x9, 0x1ff, 0xfff, 0x0, 0x549, 0x7f, 0x0, 0xff, 0x2, 0x6, 0x100000000000000, 0x3, 0x4, 0x7, 0x0, 0x8001, 0xfffffffffffffff9, 0x20, 0x3, 0xffffffff, 0x2, 0x659, 0x9ba, 0x0, 0x9, 0x8, 0x5, 0x7f, 0x5d5, 0x4de3, 0x3, 0x7fff, 0x3f, 0x401, 0x1, 0x8, 0x0, 0x7fff, 0x4, 0x0, 0x5175, 0x7, 0x9, 0x9, 0x4, 0x8, 0x9, 0x2, 0x10001, 0x9, 0x41, 0x1, 0x100000000, 0x13e, 0x9, 0x6, 0x1, 0xc1, 0x4, 0x80, 0x4, 0x1, 0x7, 0x0, 0x3, 0x7, 0x100, 0x9e8, 0x7, 0x3, 0x6, 0x8, 0x0, 0x8, 0x5, 0x100000000, 0x100000001, 0x10000, 0x2, 0x66, 0x19800, 0x1, 0xff, 0x3, 0x4a76], {0x77359400}}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:38 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x1000000]}) 18:27:38 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x1) write(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xa) timer_create(0x7, &(0x7f0000000540)={0x0, 0xe, 0x4, @thr={&(0x7f0000000440)="4f251e01f98a487c3cafabf65f2cd606f3818a7d5045e9f84a1173709f09e9f5609725af4856fe8033d46c41fcb3bba30d88023c2b7a061b4a0ff7283767fd694027b6aa77627676956a0bf0d5b766cfe6fcc4d20ed76037e7834b67352b5ca65e9a3b9b4f82837a9fcb2977f1caca3836c69bf6ded946acf6d4e04dc5c11693e74a8b77ff6a0931b56c365d524fe91591fcb5af753eb8bb1ebfabb94426b17864e6dbb3097ff401ed6d5c11a863a3ddba3ddc68dc3975fb18a26c3c6b9ddb6ad91d9c939bf4fc4a1cf71f5acd0ea70db23786d36e6769ad3ef0e4d80d88fc633f", 0x0}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @dev, @multicast2}, &(0x7f00000007c0)=0xfffffffffffffe32) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000140)) write$P9_RXATTRWALK(r0, &(0x7f0000000a00)={0xf, 0x1f, 0x3, 0x4}, 0xf) getdents64(r0, &(0x7f0000000700)=""/161, 0xa1) ioctl$TCSBRK(r0, 0x5409, 0x63a) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000001c0)={0x7, 0x7, 0x2}) r3 = request_key(&(0x7f00000005c0)='rxrpc_s\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000640)='\x00', 0xfffffffffffffffa) r4 = add_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000980)={'syz', 0x0}, &(0x7f0000001a40)="b7a1494a1392d2eea78a69af124a899911858b30f19c30aeb48f9c91ff30c2e3125088c947d701d2480d9c1cf09e2f90ff75b43a9ffc23863b2e82ec7ee97887b57f1dbb0069a70324a3c5716d5ccb6b8f5d3eeb2b480ffc9dd5736023448679428ccbce9a39ac1902f63ea477c2c7d777b1d14df25a96e55c6fe19143f05d885a953d8d75e6c562f4e7646dc47c16102da62b8340db26d4deda74f677bb54bae42fba3a626e2226d14bcae6557f8242f1f3e78be568d9", 0xb7, 0xfffffffffffffffe) keyctl$instantiate(0xc, r3, &(0x7f0000000a40)=ANY=[@ANYBLOB="797074667320747275737465643a20303030303030302a3030303030303030303030310000000005005100b9c609c388f55ee3f24aca1a1f004fa09defc02058677e22b60630e35bb352df45957ea8c782014be866e58845a5561242222aa114de5aa51cb6b577be8d9f9e0afe839c688ed57b11c6182794ac46fca087c98489b98f4f2fcbfda2dae661abb4882c3389bdba07d833e809af69690e64ff83a7a0fe01dabe2d353186d0fe4717ab74725c7da15ebed2fe1325199843aefc835fe1"], 0x1, r4) shutdown(r2, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000880)=""/250) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000800)={@ipv4={[], [], @remote}, @mcast2, @loopback, 0x4, 0x0, 0x0, 0x500, 0x8, 0x400000}) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x3) accept4$packet(r1, &(0x7f0000001cc0), &(0x7f0000001d80)=0x14, 0x803) syz_open_procfs(0x0, &(0x7f0000000580)='net/ip_mr_cache\x00') getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f00000009c0), &(0x7f0000001c80)=0x8) getsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000300)=""/100, &(0x7f0000000380)=0x64) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) recvfrom(r1, &(0x7f0000001b00)=""/212, 0xd4, 0x40, &(0x7f0000001c00)=@pptp={0x18, 0x2, {0x3, @multicast1}}, 0x80) [ 882.063236] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x100, 0xfffffffffffffffe}], "", [[]]}, 0xfffffe58) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x10}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0xc0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000200)='\x00') bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x80101, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f00000000c0)=0x54) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x7}, [{0x0, 0x0, 0x0, 0xac}]}, 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) accept$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000000080)=0x1c) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:27:38 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2000000]}) [ 882.493540] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0xfffffffffffffee3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f00000000c0)) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000001c0)={@empty, 0x40, r3}) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80800100}, 0xc, &(0x7f0000000280)={&(0x7f0000000900)={0x654, r4, 0x0, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x1e8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r3}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xaf60}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r3}, {0x1d0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}]}}, {{0x8, 0x1, r3}, {0x16c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}]}, 0x654}, 0x1, 0x0, 0x0, 0x40040}, 0x4000804) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000140), 0x4) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:38 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000]}) [ 882.645288] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400000, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000000c0), &(0x7f0000000140)=0x4) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r3, 0x200, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=0x0, &(0x7f0000000300)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000340)={0x0, 0x8c5}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000003c0)={r4, 0x1f, 0x10000, 0x4, 0xd25c, 0x7, 0x7, 0xb1, {r5, @in={{0x2, 0x4e24, @multicast2}}, 0x2, 0x6, 0x3f, 0x6, 0x5}}, &(0x7f0000000480)=0xb0) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}, 0xfffffffffffffff8}], 0x1, 0x0, 0x0) [ 882.824715] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bond0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='\"']}) 18:27:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2]}) 18:27:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x182) fcntl$getownex(r0, 0x10, &(0x7f00000005c0)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) getgroups(0x9, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xee01, 0x0, 0xee01, 0xee00, 0xee01, 0xee01]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000780)=0x0) fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f0000000900)=0x0) sendmsg$unix(r2, &(0x7f00000009c0)={&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000540)=[{&(0x7f00000000c0)="cc0002806058378823dfde0d99291d9239b4a896bee2db804e88634d29eba566fa32972c6d14caef3447328972f2a5772eac4265e7ad92", 0x37}, {&(0x7f00000001c0)="e46992235ccbea5f182edaee32e1f66f736333c0e77d30fc6f419b86f26519e5fd8b4e2a447011c579b1732d0bd2659c58aa18510d1da7609cadb7834b23a3c348cbd6fdf106a69cea6d2a4ae3ff5fa5a080ba5f22a90f64599014f415870c22d20d4252f97c4c995e348e66dd810f", 0x6f}, {&(0x7f0000000240)="876e953abe999f0d3d9694f27c08ec5a9a79733cb6641ebc12acbf9c6d4617d2c417f654733d14b943444c63e7dc51f0b2a33b7a0a424003e83b223d0f91aeb669c1ffddb1b65f5efc5c9b609c7552d123f52c7b6623444e03c8c188839f4d47b0", 0x61}, {&(0x7f00000002c0)="490ee3239221ec10f416fcd6e889425100ac108499e7c0e253897765b1535db611fd21a55dea37f9a585fd3cad08a4dcd87949f72661e1cc834921c5facb296eea7fdff22be2c3330e0d2466ffadb6f300569dea69ed172a7a44a5644f648c9bd838d9a8ffee5f6b4e0b791b6476631ca8127d867fc8564e8adcbbd8b8c6f6b92841eee13280049ea876d47c82172946886cc1740e24587698fc35ed47806c88190f5bdfafd1eb35e2aa286352d9950732d6cf030ae6234658c18bce89be81c8abf6de5ae947f961cb2fd88339e61aa0d58a4a59f54a4616f132442f406f41f3093468", 0xe3}, {&(0x7f00000003c0)="63b7acd0bfefa1ac402dc19f7bd82701dedde678526beb5926057073de84a4bbe08b3a2de3d686b22faf7fcf1e58c958176fb99f99d1bc0e6721509c8ca4b67f2365444ca9d6d9928e92e0f39fad614faff10f0f23b0546e8530ba65e68472f490ffab83f5aac9f803f66eec00404a636be713ed1bbe8f1d3fefa7a8ec5ccd446e66b2de92ce50f4ca86cd6f6546bcc9dd94b38095eb0e0aee92c9ea78643411b589be6f464efb1592e1194170c8cf6461fa0d1cda073c6a945a43f7ad5dfa0189725c958883178bf07d4e93c1ce0c", 0xcf}, {&(0x7f00000004c0)="d23a5540b55ff63d68cf838786560ac70aa18d62cc7bc52764956308a4cc4659066cb092e25b902a042e1b5e4d0ad15239c440878239ec8e8c6869f76f5f507386f832475d37e6ffc760adb86ebcf35ae5", 0x51}], 0x6, &(0x7f0000000940)=[@rights={0x38, 0x1, 0x1, [r0, r1, r0, r0, r1, r0, r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x78, 0x10}, 0x8000) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xffc99a3b00000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0xf0ffffff}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x0, 0xf0ffffff}, [@NDA_LLADDR={0xa, 0x2, @empty=[0xf0ffffff]}]}, 0x28}}, 0x0) 18:27:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 883.410739] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:39 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x4, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000040)) 18:27:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:39 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x200a002, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioperm(0x0, 0x7, 0x0) 18:27:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:27:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, 0x0, 0xfffffffffffffe2e) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) pipe(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)}, 0x40000120) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 18:27:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x5efff7f}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:39 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f00000001c0)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000001580)=""/195, 0xc3}, 0x120) r1 = fcntl$getown(r0, 0x9) sched_getattr(r1, &(0x7f0000000040), 0x30, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) [ 883.712356] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x100000000000000]}) 18:27:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x20102) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000740)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000780)={0x11, 0x19, r3, 0x1, 0xa03d, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x14) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000040000000000000000000e9ff000000000000000000003800008c0a000000200000000000000000000000000000000000000015b6a8cd5ca022f6ab939870000000000000000000000000000000000000000000"], 0x78) socketpair(0x2, 0x3, 0xb, &(0x7f0000000080)) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 883.853847] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 883.860631] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 18:27:40 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) memfd_create(0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') getdents64(r1, &(0x7f0000000340)=""/57, 0x252) keyctl$unlink(0x9, 0x0, 0x0) [ 883.928994] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 883.956504] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 883.963148] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a37e249d04accb22bf4381c6ff8899a0147faeb0e770baae2259dda72093763c4a5ab4589c8498914", 0x29) r1 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x1f, 0x203, 0x80, 0x3591, 0x7, 0x2, 0x9, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000200)={r2, 0x3}, 0x8) r3 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r3, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = dup2(r0, r3) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f0000000080)={0x9, "2d0096e17f11aef3bedc285ce20567f26c0d99011dd6b03f8cce239c7612e0e6", 0x3, 0x1}) 18:27:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x200000000000000]}) [ 883.976872] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.014825] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 18:27:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 884.062501] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.089727] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.141785] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 18:27:40 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x800, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000000c0)='syz0\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 884.183992] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.218826] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 18:27:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 884.228717] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x2000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:40 executing program 3: socket$inet(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x1ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='f2fs\x00', 0x0, 0x0) [ 884.257020] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.292485] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.331619] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.361887] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.397338] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.422734] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.442245] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.461714] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.477760] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.491563] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.505196] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.520033] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.533821] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.542302] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.551682] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.558556] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.566365] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.574920] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.589716] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.604555] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.618252] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.625766] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.632989] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.639845] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.647449] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.654848] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.662076] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.668954] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.676305] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.687534] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.694848] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.709842] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.720571] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.727982] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.735715] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.743117] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.750326] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.757740] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.765087] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.772281] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.779461] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.786794] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.794201] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.801090] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.808396] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.815837] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.823154] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.829991] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.837147] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.844416] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.851796] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.858622] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.865824] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.872972] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.879794] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.886942] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.894083] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.901168] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.907968] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.915195] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.922301] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.929344] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.936443] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.943556] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.950393] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.957618] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.964784] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.971867] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.978686] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.985938] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 884.993090] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.000115] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.007361] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.014490] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.021547] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.028369] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.035491] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.042707] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.049540] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.056846] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.064076] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.070951] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.078387] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.085636] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.092776] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.099575] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.106796] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.114138] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.121252] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.128035] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.135194] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.142350] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.149181] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.156346] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.163495] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.170297] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.177485] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.184622] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.191731] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.198533] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.209060] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.216192] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.223266] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.230337] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.237459] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.244990] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.252056] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.258849] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.266044] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.273175] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.279984] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.287258] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.294368] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.301458] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.308252] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.315432] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.322554] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.329388] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.336506] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.343658] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.350879] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.358027] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.381023] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.388210] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.398375] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.405623] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.412757] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.419844] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.426989] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.434068] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.440860] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.448094] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.455195] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.462248] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.469044] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.476386] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.483506] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.490316] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.497483] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.504647] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.511745] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.518554] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.525787] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.532932] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.540000] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.547093] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.554209] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.561021] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.568352] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.575462] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.582570] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.589537] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.596781] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.603995] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.610815] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.617951] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.625061] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.632168] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.639441] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.646573] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.653837] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.660736] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.668041] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.675298] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.682538] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.689394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.696700] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.703921] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.710842] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.718497] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.725665] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.732781] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.739610] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.746813] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.753977] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.761245] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.768087] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.775237] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.782342] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.789383] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.796462] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.803612] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.810418] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.817628] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 885.825899] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz1 18:27:42 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/loop-control\x00', 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000740)={@mcast1, @local, @ipv4={[], [], @multicast1}, 0x8, 0x0, 0xffffffff, 0x500}) getdents64(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendto$inet6(0xffffffffffffffff, 0x0, 0x100bb, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000180)='.\x00', 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:27:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}) 18:27:42 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000280)={0x7, 0x4, 0x0, r1}) fchown(r1, r2, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000740)={@mcast1, @local, @ipv4={[], [], @multicast1}, 0x8, 0x0, 0xffffffff, 0x500}) getdents64(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendto$inet6(0xffffffffffffffff, 0x0, 0x100bb, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000180)='.\x00', 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:27:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x40000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x1, 0x0, 0x1, 0x9, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000140)={r1, 0x0, 0x2}, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = accept4(r2, &(0x7f0000000340)=@can, &(0x7f00000003c0)=0x80, 0x800) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000400)={0x400000000000, 0x5, 0x401, @remote, 'team_slave_1\x00'}) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000006e000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d41f73c1fa5f09b3c22ca62a61b67f8d3d5c6dc7b23efcd368effb300c5ff5de4dcbda37516c54a67761e6c43737c9e7ad7419e20be885d624f91eabcbace26041278d6516c7d4c5bfbc1e321bbeae64f6431b1839dc602f0bf5531651767b39d3aa59dc801ef93ade7ab9c5ec3b3697dd23322a1d56a981745f9d0b632cc624e99de27e4b2c9fa041b56b72fc77cf4ce49a5c90801046c7aa3652d9c62234718542ef52e0135b9ca138e5d82411a61a4d2a35588e2b010a4364a337055cd381c3f180d31fb159ed41e8a5fa4c98a9eec0fa65b47dfb00cd3a644ab4d1a0677fe074df553eb8d099a07b8dfb0112b503a2b7262735f31ab0447d8d9a2ffa3fa8cca90dc2d5d2fbeb26f04cd5a73f47d7c770722d1543"], 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) pread64(r2, &(0x7f0000000440)=""/203, 0xcb, 0x0) 18:27:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 885.915280] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:27:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:42 executing program 0: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffc000/0x4000)=nil) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) [ 886.075231] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000780)=[{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="50db26d5e8f31e7835618fd79e8191114bca0a5bc96bd0ecd40cc48bacb26b5b7c09e1568ad4f17b8bd7d1ec610fa9262994602ac83642888a4cda08f1f218d3052f738d", 0x44}, {&(0x7f0000000140)="ec851a4f99aea43aaa", 0x9}, {&(0x7f0000000180)="7d932837b4ad1f5325def4d4840b31eb7785d0480acf6800836d8cfc7ab3d316185c1a95e857cef9d9f7d085e1c279c07dd985e03ba1903f19a8a33bf51a4a13471e48b9f52bde600231173c9bb88dffabaee66764b166587e11147629ecdca0f144c36f58218772068321b6fbf942e33b6a77faf736cdc9e20ea45e46d73b161a618957f55b1a31f7735cfc04ece251e463efa804036d1b33fafda9d92399bb9a7c6599e143b5f225895d5b4610c2f6f3f448fbb999e65aed13b6dd35f1323b68fc7658354009274e94bcb4add0f92e009f", 0xd2}], 0x3, &(0x7f00000002c0)=[@assoc={0x18, 0x117, 0x4, 0xbb0a}, @op={0x18}], 0x30, 0x4014}, {0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000300)="5f2c3e4dfa6160de34cd4e678efe7c00cc535c2a27d5541925ba904e19173722630cb618efb9840ea025556504c8ed7bd19a0dad05e18fd27a9f535d34ae31ec3816056b3c2df089d0dd967a30b65d05d41fdbcb036f102a2a91495d0d4773fa77", 0x61}, {&(0x7f0000000380)="10c98c14dd374d4319bd36", 0xb}, {&(0x7f00000003c0)="ed6ba84c1ce2ad6626b9755e2bfb8c4320d2b9a3c596da570ca7ffafb1fd0bf7e6dd229e222d2ae77a268b31f876d17abfe60a961aca", 0x36}, {&(0x7f0000000400)="1d64a8d2ab2c2a28acd462d51a4753021045b37f33b267b62e422b74", 0x1c}, {&(0x7f0000000440)="7cc38881866358d0003e946ef7a3814423dd20cdf512377451fef7716ab37450dd2036f317717701b0e0f1a9f55294403f484ec46c9a1fa8cd1791ba12be48ad884776f3cea4a8e05b57fbaac1e4a74e667fd1d24e5727a13c50499f0ab6a8fc5812e02b62022dbed622e8db8d91d32cd207d16044f75d2824e19f816c66a3660063065ad8c54d62de3caec4b83d64d8ce889303bb8d79616431d4f0f42b79c33fee98b7db33ccf5b2bd42c477ac68021642179e", 0xb4}, {&(0x7f0000000500)="c8bcbeb4b31c85e330d4b2b5f012fe11a59f3a67a1fb9390b44fdd2de0722abd88d16cbd5d40b26c44901d62814c4389199808a000c2f82b2f47335900615faad7d80f1439133b73c66416866f9f5bd4a4ac7a9d9b4cfb1dc2379e79837ac946943b78398ca5c46c6453c73b67a4302851d6da56edcc84e46bc43a1c3adffac25c659f88f6ad636dc73a3cf227e80556b92532b073fdc7b06e37e5a2bc03909b9cd4a352b544a73e95621c5d06c48093909eb2a87edf14def79015c78efb5c302d5ebba6f3a5c3cda2add2d18e323c3a132908", 0xd3}, {&(0x7f0000000600)="f27754cd1b389cbc38f28bb0d89d0ea3ec0bb2405d86100487e1d6", 0x1b}, {&(0x7f0000000640)="290919e50a1259", 0x7}], 0x8, &(0x7f0000000700)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x20000000000}, @assoc={0x18, 0x117, 0x4, 0x8}], 0x48, 0x8040}], 0x2, 0x0) sendmmsg$alg(r1, &(0x7f0000007140)=[{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000800)="2f7f938be646499853d4dcce886a44b6a29d65d67cc4621e25a8d12d149f30797261f090e7b2", 0x26}, {&(0x7f0000000840)="815b301bc0a29a7fda75b16a2c9ff476651d623126532a6a374d2a8086c12d715d175bb9d0ace68adef934dd76abe738e07170b7fa9b008828e2eee50b24eb0839015e", 0x43}, {&(0x7f0000000900)="70d780ef715b9b6d0de7685d241eb87b2d31bf6729205c619bda69124958c5ec627283e95218fbf5e48e962413315464bb17c608de00735de10d50659b4639030ceafb963e2851e5072bbac2a5cf649f009b430e064064184de2ac835ef24a3b71321130d5672b291d26d42a12dfb2163e1df38567d107fd16a6f67d0458a744a4c5397a4ffd77c327c216420ca92afd2599936239ab2aadf353bfa020968fa33fafc3834e185fa7adca27c4d1f9022e84a53a554009", 0xb6}, {&(0x7f00000009c0)="db676d49d97da246bb8affb9f8bb7b5255f73577", 0x14}], 0x4, &(0x7f0000000a40)=[@iv={0x48, 0x117, 0x2, 0x34, "cb87b07bd13f2fde0719f6c2dba2079717bf553d0e929a2fba570d26143c04ed5f4577669043f0d8e03469e329e234e228444e90"}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x81}, @iv={0xa8, 0x117, 0x2, 0x8f, "cd2f3f1a878503aa203c7bb3cbaa43e2f266f09c1413f5b80dc4293f29aeea8e82414dcbbfe583f19816c028f53301e8d8c3cfc281964612feb3003e49dd237e437e0a0b3adc2dc06d80d2d6e53d001197db00ecf13461c70631df9e8e8f18f455fabcc7d0cf530a26bea9a654e48280c402355cd14ce922c72649f17696c8ad8b378bec2f55275efe217eca40d12f"}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xf8, 0x117, 0x2, 0xe3, "9c36d387d6fa353339d151ceebdf0c41ddaa09307e48ccc6b5512f4161ab3a0a61c6901954fa9cf213f53bbb0eda347e7eae1aa8d2c693e21b973732e466e90a229b22fd069fd6626676fe43c252ddb6da69c3db09d984b5ecc105f5d39a5c9c44257310f7e428267e564d8dd63c1e39f6fc0f59bb6d24b57fa5e835d07466e5eb19d5c468b39362fa2b6faf88b9abb41e23e2c7052e2885ac31563beb33174851d822e6f4fdaed8fc82f55606b523d7be394e7f19b18bf27397014c78e9ad03964d67206ef977db56037eb98df393522178e230f04bdf4b5df5e2845e8a7ac06d5dc2"}, @assoc={0x18, 0x117, 0x4, 0x220}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x3}], 0x290}, {0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000d00)="0e4ed870838aeb970a504fc18e481374f5cc0b3ab300185c08", 0x19}, {&(0x7f0000000d40)="81011e29356312db387c5f73bc335588e8a54fff44dc158d9117225e085601e5e50bffcd12e1e8c6d280bae6a2bcb8cdc1", 0x31}], 0x2, &(0x7f0000000dc0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x73d2fb2bd69f4c1b}, {0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000e00)="f02fa9cc24c3ed601d5a0bdf7375e1182743de6bcb72377d1db4ce038cc7b36b6dc283c0d58dac539487bedff7ab176e7c02d92a0177452d92b4837dd59cf6afa27d69592e9672185e8d65c01e15154b2b791d7077d7faa9f56f9890dac0d1aa35adc81cae59cb137877412188f39d79aed92f59875e958bef4bbb8c7eb732bd000b", 0x82}, {&(0x7f0000000ec0)="3e169e30e1e67a9b1eb370f46e459b46c3e465daf248e6e35c087d11118b186f0a7c7993d4b26977947508570e5f704c8377dccc6b1856f26ee6a1040dc161356fc8e92b5b6e0aef2aa7720eb7e3d6dd6dd830bfa6561daf3297c5960c89a1c41d0451b430b4ff0764d63f9f42ff5a6488", 0x71}], 0x2, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x6a307ec0ebaa48ec}, @iv={0xa0, 0x117, 0x2, 0x86, "72dbfa32d75132b42dfa602815f189a3b14d9c6c8bad8042deb75d336667654a72596fdcdec0453219886b56866870c8ebcbb9a246e1b639099f00dfcad8d9aca490f745cfb352d01966597333b24b5fda6482385a7ab15a709e8a14559ffd79ff43fd6ecdf9f9c8a645078489d20e4bb861ac1296efd88892849d980d1bc090b75efa434629"}, @op={0x18}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xc8, 0x117, 0x2, 0xae, "b267044916553998f59ce1e7cf494f9c0734c6b66090a5cafbfdef1194212b5225980b55be2fcd69c45fcddf4b25a64985c0081ae63db2ac14ba25de0ee0cd9569ea14cfd13ad8f8c1b08567a7d6b2e7e26685d26bfc891303d4ab44b027769e297de48e78b283e5501fe9d727328e0e83786110dbdbe0c14eefeaea560c7b33f57b67173fd598a4746446d607d58412daadc41ef445ee4b88c66da0743e55e7dd8e5813024f3dd6404f1384a399"}], 0x1e0, 0x80}, {0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000f80)="5d8d177863d8eb883d36a6364300c2327e36211269b9e544f6ae3b92d99d4f0a56878c1d1b2dcd4789358064678a2a05dd113626a3d27640a4bead5e558b6baf9f0f534852453adcd0e03cd90ecf493c01a305b3224f34463ae7c3fd937e6687cc10929e9150805f240f6db26a747f7d3ffe960e756652b6a91ff09e47e58518b62cff504f199bd7a35d7c43c113214baff0c3b3ea07c5897beb48d9de83146c819bdd268a77b08eba0ef06078965d846c938f7d677ff7199e0a1331d5f3eee8ff075d2cec54ef7d25fcf4257c6ed13d114f89371b455961fba5", 0xda}, {&(0x7f00000011c0)="1ffb15b3057da524ec2c2484b7aaa044d0a896090b4fda7b9e557445b9bd1d2e9a135db3c5b5c727848469097f962f4a240bb410f16f9deb3ed31e5f8e685a633d60eb4870bfc5c4b65552cfa32e7e7091fa8271bdecd790749da925497bb27ef0f5808c4682fe116e8c19868674e668f48b4b7978e9ffece33d80ab84320cf37528bc70b4ee648e87", 0x89}], 0x2, &(0x7f0000001580)=[@op={0x18}, @op={0x18, 0x117, 0x3, 0x1}], 0x30, 0x8000}, {0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000015c0)="3658af7c0306120de1", 0x9}, {&(0x7f0000001600)="654c99f87831cb831d25d1ed8f07ad14df1dcd", 0x13}], 0x2, &(0x7f0000001680)=[@iv={0x1018, 0x117, 0x2, 0x1000, "de4ab48583712398372e534d23f5d84e047637be0e5ac1ff2ac143b716d927024e67907f8efba0236cc3a31f879422bc52c3662b0c377a95c7aabcfd3f63ac83e9260aaf162a2626f66590f0375a5ad30e74b6020ccbc3df0c671d2f72afcd32a90ddffa1f2bc5cb126e37a2aca64c964204e59e9e4eb612778cf7f83f2500eb765ee05988424b4e52540acf72a213f890bdd5059ccb8cda65aa51f39d65d6e9cef9845a7804b3f29103d8d3c6803f3357cc969583b40808447300f8c55ccee9d990f14cd8d86b7ab651ba750db6a8a7f292c7581d74ccc81cdd4773bbbd3c5e026a8829396b1cd624ad8171c083b55a153d38b0b43e18b824f9f74d049d7a232d781a40d4428ae4bf59a7d99c6de0e8d1e3fdd7d5b8b85d7ffb2ce6cb897da45f9715c90f8ebae60f9873ad2c95566601e47606e6e1b14a425d62ea050cacd9e85113b544a80e1df344ee7e1060ae5c74acd9f5b6dbb3a2123f3f6f734cc7db6feb9b417abd5a7dedfcc796c5d03339c5388b477a164564d626a00c959a8f4b9da030d2f38eccdb0f6cb274671162113bff95fc9fe1a347f42dbc94ee6db8c6fe0d62f9f2c9f010910f4a95c346fbdff51ed4fff8cd78f8ac4f21066dd9ddf3f90d93bd19071d1187dba34a1cd111deda492edc8babf6cb091eac1db36da1f018b2578b0e73c69b6c4b5bb804b640ad1cef41189ed7144120a0600061b60441a0973b491e41589f3e99e05f418fe8f49b1678072311c23569f1669a4ec52a519cbf478c5fa826591219199a18d3045a106da3b29e5c7de70419cecc5da8995d780ec63edefa47fde33ad693b5882ad1abd6e11a6358872bebbd121222f88e8da628325d66d973ebd0658d62654b9acc52a6aaa99b3cbc853e31b3de6fedd382a156b819421b39b128794527a0b756e10e04cb3d096d249486cb69f1d814954c3746aeab26c6089aac851ef3ef4841c63bb5106fc5b5a8fc78af3ebd459078a4edd519f32abd998a67e3f1cdadba7020f7dfab320bd01a959e7fd3e2701dbc873dbba3b71ed6fa482013ed1ec0c66532aeedb8f4579b4e2b45be3ef91ddaa00fa6a049ba1d51c9a644f9742680a1ea5b0d362cbefe26499c133e91a5bc1079c2858c6350e08e8c788723677350f66d1de3641865002b7042375a8cd558543207c49996dd1dba33a294858a8f4f1202ae9ab0be7b7df7b26bf7db88da3130ab574ac616b65ded3d46859297af7f02e05f70a40008151e37f3e7fc4c58ece2f0fa63676fba385522cc1db2dfdf73c653d466185d9efaf4667c0f8a634a344d913f3322ba0fe5188b17d9744a7a52877009f9113b6487da681adaecf5923fb724b0b2d6f68b2d1f3296f83f46048d79c93edd781c930a6f226fb108f087673c060ec028b19fc0d8ac290150f33bf3d32ef886d3b84398c21eee76dca8db8c788c643f10e7abbd48abe03b9054013f19ba952d7ba04288954a76f665ffe2005e94e369a1f445c61c38d078b689ae76cdef530bb369effbd65a959634411be1f2e685d03bef27d9c7c7dd8d9213908b99014ef606b234b432fb5443f586ec455354a345d6faddbcd596f104d73bca691a24476ec2cd39c81f23a737eb2ce575aa537d1fb8305fb03b784a0d0096642cf13d0067071a0e16b63c26e5ec7e3c880c23cbe32d563b9841f24ab6e51e18d35e1e3c15153d1e686c4376d5eb876c72e11416312c6ea23efbc53880674e5adeda8376575d8091c7e9a471c7ac1db5f161fb6b9496925faf43214ae8f62f913fbe1e15128c66ba0de56c32f56b41cc4f8820653e347ede09a15cca7495d09824ce3ec7195080ac6066442490794d9991b8bea86b466eca002120b15ae732ad9c707f8bc215d40016e1b1d64f4c98facb33542c0faf6b87c5f51f7aa9845301e147249573882f47c228f30d9bcb8c316b2ca8a8ef40c0cf867ed9404db71c068d2faf62da7195f8040672a930957df7dbe3dcaad3d113adc85498abca9f5f7ddbe2c737e1381e318a217eafa499d6efb85ef9019afee538c84a59d1ac707ccd4f8bbbbe7ca1a8d3324bade9253fbf4f497eb669032bcb9a0ca6b2c9086d9a066e534185bb323483c175efac34ccc03b3dced4e6dec717b8e7e9b6c223a78b917c44356283f2358c5415bf31d44b4163ded0fd5237cd9c4bd298fd45a73fe59453bf9219777a9906b971bc36b66927104f487ef19e0fdbaecc93fc3d63d67edb135bf69c2088da783a2290d1ba4a6f9aeaa27e40b473b495d8c20ab32643878ccdf92cdaffc7f2044ae3e496565160e0796eab64a65a33ec906e082e9defcdcb4a25c2d6238f834965d0f5cfa54d991c6522131804ceb75b143cd6ea5fb944f4c4ca37e85d3dc10f8422e92fe00bbb406fc2689772d15ff7f852fe0c42b72a6188b9adf0074c33996bc39f9cc7325dc221a42e0095767f65a9c93cb1c16109296a6dc6242cd06593ba2f4deab535520fb0c2d1613eeb91e4bf3abffcadcb31ec2c7acf3ceef8d52e6f23109bafa1e4139ea010188fd92dcece475f7616f36314c2fd0d126774eb04b8160ed3312eab587567d6c346e51cd7017ea93c9d05c405ebd2bed64e1ea1a2977104c4e9818c6f3c0fc68b32b3e889bc5c6c78c8e9dbae5808b791cc1a2ec17a45f4001e680fd615ed5f6a0f7ea6fba5a6ae592b27e984aeb836c4b426079452d49298a8eb895f8408ce2d1c925a836a85824fb7d8fa368de4add62dd8cecd3cc6132637f8b3102719f74698c9c48605a49c92b3330c9c879357db20a119211feb5f9ad8cee8968e30629c30c81bb9184403ec54e339eaf2d00609722a6e836b1b736c473f59e40c471799f63f7e2ee852db188a14b22ef278fab2995c1c1c063ee9649683bae94b257c693ad3319d78c8f5bd0c2b6f339f595e8cba38ad60197b3185b6d543ac937866103e330ef7ab6bdf1740cb351aabb7ed91f67b69de4df02bde095d4002d3bfb99d9d65d6888c4e34286b751308b47271497d673f3c9f7c8d41c3094db97e565bee5e6865015a778b9c3f03fd6396a707d6e5a8855f6c61dc65c2523739cd2da9d5d48fd4d4274f12f56f26c79dbb7aa4eeb6f60b95a6fa573c9a2673e4d80b25624ae26ea78f4779396abe85810954f3f70e8acd0e6ae93af3e41413860b33f7fd36538ea98f281afc8aa59a33bc5006852cb41180890d13a93aee009f0d05e90ad82a8683c04206d2268b331eaf432f75d7b74e0251d181bb24455521f05a106c84f854156e044a2c1cc1e543a3f91583b56d6d9c611765bcf069ed90d7ce5af4023a9d562a562df2e6c0ffad1a599d93e1a3c7c827f956954c92dbe6dd7c182b7d876029180dedd9aa3a4a6d7ca3fca895739345ac9de9e4c94f89b1a9c48b0123ab350e83fff3a434271e10b78c68c363496d1e17694bbccbeb5c73cb6c6b4ebc028086de169d7a6b8758230b8c03f7f376326c452c13fc77fb9603ac8105d7a19e80c7f212731f2675d4cced909df17c78a4e8ec844797a27a959a6f69be0276b48572b51942661bcd99c23e42f8ab243ee7e17e21c1c2e814051e3b8a7e231786387c060b5cca8234248d84bbdb17e3a6f7c34ad3693dcbda9b5b37a78ac73e9b3e53a7ee6435ef30e2ddb54836300e9e197301cd9f22fb055773730596464cd12685e16504b9a02954df61ded7cd1e71be09719dc2743140a50bf432f394d25fd1af1b0211e0a9ffc1cd5fd72fb1879aa366670271835d64249693f80c367bc7100c0ea25af50f3883280b0851453ad00b4e8ab484aa7a77d4b1891d9da6f671411889f7808b880105072ab8fe61c925e0cd770af5a7d7ab892ce3c529a15dcaffbfba7a547f728a044a761ecb823ee1db1f4480543729742f5322487ffb59e27afe607721879b9fdd2b427740a4abfb14f2d3917e05b9520666f0e817cc3bf9120f30911730e9afb1c099e079341a231bde775e48f6f1f619fd99a91d26fa514e870ac30dd3fc505ba5af2b9e98520baaa93de1e1484a03b7ee10ac466d849d47a99b1bca29c8953813c47a8bc2fa5e52b092f40f3fa7a0c961e54ae9aff7a4f57e4b776fe900655e544f24a8ca4c216222819dbe3526ff21b2286f44b4a9dbaf126ab12e8d4442a7c88fa87cc2a4e8637224735f4a5efdc95bf666fc5380d72735a5b7a76b6a7925ef0b27b07e4abe3a6812df8ccd1e64e7e28442e37be9294ef9da64e39fe1221906cfdf6dbe14f010ab5ca45e1ecefc3cad0f011fef2d73f05e1e3824885f4784e6e08a0ce245c7009167ab34ed72f812a898aec6fca62b82f309710cea8d117512f2f3e00b436e66583b448d8f2c7fb35d419eb71bd39aeb0ef1ea7d6e6cc5c2078e369a999e9e3a3a0c525bb04e91ebcb0f6e2e144dd77e60c38048fc15e3c5f53108586bab6b7ec6cb5cdeb23dcdb4749d439ea34833da59bcefbf9273cc2d4d1cc161cc56ef673f52b4b53bc39bc095fbdaebe7668b750911e5d2ad6609dcd6fa5fa05352c34fb0df0ad429939bb61bce25efc994cb6e45d8282dff74b3dd2a39ce331ac53ee098d3672bd9ab0f851922ffbb83de1c6e556b23c036cddf3246bab3f36b168d90b6fb4ce8400406b9acffdc15e88625fc1e4eb79a6e57522448b5604759bf39c27a13a3e29e0034f90d047d31025486e08a89e837bdee78ff3c6197108f2287f8f9fdfe18e496163e58d71b953dd5422d21d390c3001930ca297c0d20f6fdaeba2f8e4522a7e29c19e44f0d31f47c199c9bb22ed9f74f2cbd2e434f12d91062ca52f24286014f1c49b5de48d59464be7baf57e38dc762ef8d4d541677b8c6641151b704e5b1888dcac6f739e75c1ea47672036088b18b1f416fc09a733ef31135b3ebf22d1db01df7ec8341cc24f09a6debccaa339cbfcbaf7b9659e8ea27e77b003ae767d59f3e14c274237e2abfbabc2c1042512c3e0964d53dcaca08a5403feff22959e736ee915ab6fe689d47c59ffb6729d92c83acce48557c9fb9d1ea982092ad01f96b20ad1baeb1b4c731e66f6832ba0f4c1825230534b5fb7bc18eeef26a16b55521d65a847f4412f9b97080d35ee19dfa06af1d0d3845daaa2ee5ed89c531ae92fc56ded92a9cfc4e6aed0cd968b2ce81ef6783f96f5bf077bc7caa0446e71b4bef62d555dc094cb9059255d3c3fe2c1313c52f3ca9be541802ca17b6f4e572b946154dcfec0c314b53b172033c357352774a9458fc92d386fa58df83c45f10d64277ea50ddeeafc1167171f83333ef4300761328f5dcac78906f603848aa5c7169743f4cbe34fd311d024038f0f979dba1cd8b3084d6efd41927f90fe0c67e14c7fe9f5faf29b231931b4a50d4c5d6bff013c58cb95651ba6096767f053b536dc839c79c6e454534843f2f7049bfac76ac484ae7eae2cc7905127f42d05e94bb5c9d3f4605f038d9972fe359162a4d8234531d153872b0288649267b1f4622a100bf5c1cea4d2d60cf2b043c405f9f05e5219e943a72f6bc872d68207d4a51cfb5e9748777a05e44fd9c0734ec7da40ac3ef9f36eced996e40fe8c52d1dce2c22a511e07573ffb295a2fecea46b8e58bea103fc9dc0d022ef90de101485edd56ee902ee4662e864f9f97f392b19d565f0200a52ea0efc8bf23e0c3633ab9343f604a2cf171ca7110360b1fb81bd571be60f6c2936336edc3952e53f83dd6ab02696b93826a6b320d799099fd6f68770a33096d5ffa2268a542c9ce354201e287dde70049cd867a4255cd81422938d8123877b45ef5572f6d1b00406958b1944cb4c00bbf0a680c8b"}, @assoc={0x18, 0x117, 0x4, 0x7}, @iv={0xe8, 0x117, 0x2, 0xd2, "c5c0727d10cff9de1ad71ed6826f118371c5aed314a010f7ee26458ea5f973a54dcf08b1988a07ff4a674b96e942580b25933d4d46ef3927a3f6959adb8c9769f5d9efa93d721c1fd3eb8e714ba2d3c5e01e741e7bffe653dfc1d1eb346fd7e871475e564c31e9290f48b9b11cf44be1e2c9ea6a65d95b6c1c06e649b417dfccbd728a9d4056a543cc4a9b3a79cde946c2d7558237eda8cd5279b4876267cd47048f86d6afc5e273db4ec1139e8d8eb8d4adc6aea09581407508328f2db028224cfdc490143df12d6558145e5c803fba811e"}, @iv={0x68, 0x117, 0x2, 0x4e, "a9e37e17b4c102693245e2fdf110f52679fe0ab1b606c9ec86aa418677c47393f3884c6f5c393063d28d351940f18f96fa3d26b32ed21f56033552d0642022a7c3008df96427f39b592f02963752"}, @iv={0x80, 0x117, 0x2, 0x65, "5a708d64a64acaf8663bdf156b77f6debe8c3f79d8955596b90554707a272f13693f3a223965f96f47f407351ff49a764cb44fb745a59c98250718fd33ac912b286d9c063df0315610d8a8ce6449a47a92b9541484fa11bcfa3002815d25dc5b95e3998526"}], 0x1200, 0x4004040}, {0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000002880)="a3dfd37f88b81dd7ad36610d426fd05be9cbdecc85644429f7992397dd15abef3da3c73908cb831979c91376a2bba2c47a4d57097aed0a0717b27be22abf9b8d91c459ebc6fcb3e041ba274cfb3a1669075edb18fcbc9e71a52c29e282c0978a3416d06e219f5e450a38480b28a980b61d7bc25476070ed4f6a1adc35cfbc907b6b74d2b4188cd0d695c3ec41b440f684356c89a6af47ee00de997", 0x9b}, {&(0x7f0000002940)="a4a7b03e0fa6cf83a20b9eb2947361ce264bda8d80e33047e9e36ec6602f85903c9f9d0179b3be8683420db47ab230c39354668b6d8dc814ad1c96cdc6d0474ca1221794e295e2e9a4fb5ea7b17ffdd4ab7add21a0aa6e3c6ac820c33fcea414158338da2e1f01f02c6fdc6fa5dc36745bbe6e8f6e44ca2a8be2b7cbaa80894256233baa9cc900f53b2d9b3ef879e30ffed5ff855d7955fd1665fc42b37ddc7b160fe18034a0bd92cdd7c4893d19228065de59db60936493e6faa21910aa84e8e3e3bc8012627a6489e67634b2ff9248a30b6683d7e30caf2d1619b8fef7abbd2ac02c26ad5181272f3020f465", 0xed}, {&(0x7f0000002a40)="edf66d0fccab87c2c7888e88b68912c5288d80f718cb049c3a60defefa8ca699ecaf596644d993562de49216770707545673ba36c6b04602d41ffcaeb8efc67fcd6352cbd39809c1bcd61271d59c5af3c4204ecbb260292244b0b3ce202efbada712b07b3a2c5fdb50e0db74122876db9238b957f9360005f66f1c903e67fdb77d55bd5a13931971382076118e9976adc00f0d25d413e0624f93", 0x9a}, {&(0x7f0000002b00)="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", 0xff}, {&(0x7f0000002c00)="0a01279b7bb39d288e7fe661c28647a3b4d78258a2d7ca77a05264bb87e9a015c9d87fd9cabe7894f5da170aa74b44ed6fba49d4d786a888613255d132d3bab2b37f8a972c712512d764235fdb84b09570787f784b654c8d02ec29c077", 0x5d}], 0x5, &(0x7f0000002d00)=[@assoc={0x18, 0x117, 0x4, 0x3ff}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x20040041}, {0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000002d40)="20b4f9106253815a1a5a5f268e34442152605999a70cebb0ffbe8a7811898413400873c5ef498aa49d0de115a608b5f11cd2cd5ddb48379a9ccf0c64e785f7bf27e84aafd785f594e74b7dd7e75f5eade8da49b50af7ddfe8fe26ab98f08e14f94d7f5d9084faebd9599b660dde679050977efc84d10e1a38bea812d520ae512ed6c8643c59da9e52acf1793d673c6b7aa8d1eb2212b50f34edcddbf6c3e32b481f181f54ac687fe93cf37a6c7802dd8cdaf607ba80191d6d300be7e8a64f7a8480f49fc6bc477a4e76b9f1ac082a966", 0xd0}, {&(0x7f0000002e40)="6773c28db06c405287626a60d85f329664003539c15fd860a39315c29363b9300d42cc3c4a70643325d50d5d42896d04432ec306c9cbdb59b1346ff0ea535e0cba2c6b11aeb503a6e1", 0x49}, {&(0x7f0000002ec0)="4848a57aaedd75bb86fc9785490692081ddfd11db1fdd0f8b9607ebd71dd4de9e220bd851cdf7f57bbcbc50e98932e689296b7e6bfd65640bc8f7af3b87af0a214829a9f72e439e3380ea46a0dc76e95e930112334fd2915d892fa12a8fc15045427a92777", 0x65}, {&(0x7f0000002f40)="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", 0xff}], 0x4, 0x0, 0x0, 0x4000}, {0x0, 0x0, &(0x7f0000003580)=[{&(0x7f0000003080)="2027f50603c0", 0x6}, {&(0x7f00000030c0)="2e392d895afaddf277d0b12e9bc0dda0945918d74fc1a98ff23650797fec283249c524c18da40d6d54f99a1671f960ace1d7fd5c2006bb1d14b00af40e83b852b5922ad1b34b0187e0ef4fcc21fd6c467dca4d5bb094bd012748d14b80b98eace541c9d4203afd4d15e09c2011c38121abcfd0168123d19ef9de7e77fb77997808c767828cf7956014d7cbc639751c7f49ef8f243d8defa2ef077585", 0x9c}, {&(0x7f0000003180)="6f7e726277e7a78edf73635d3b20601e4dde4cecb99cf7c4b639609cb4fd007ea76994983291c4e4bfea916f0912810d7075396bb48bec7052e75349f5b42406655ebdd032a252065a9aef8a11bc3a56e67a7ce2230e9f6862a70f55d3e377412e32a3e5ed059a93", 0x68}, {&(0x7f0000003200)="11e68217c628613cd2c0b8c38d73aa5e8f8885dc7d6c1a871292c7f1d52c2991a834b3632436d6b3d2ec2f238e3e7e782e974087d2f3a7f37ffa72245be2c63c27deb70ee2e61b58682eee7fda868a37051a15db4648876db9b05756abab9c97d0e0742220e91716c68b92f9b7010e2301e7c2280ba3be2a095ecd94c092e0a0dc218dc242aa768671ce71266bfe6c1b5b1e4d5524ce39cf2c5c2b95271ac1195bde20e0d1cc78e75369c0b3", 0xac}, {&(0x7f00000032c0)="48ae99bfaf3cb7772e4de2b16d4041b9085a8276a208879162bd981fa9c9728e46056d81aa5f5de5d9f44f3dcd0f2e60f81383acb762263f743a16e82393d354d4dbb16ea940412f9f031754612098f119401907197ca2a28e274d903b172053b9fb8c2927b2a5e1e258ce47b74bd50272a7a1e03537945abb08ff51d9e64a085dd827039d46", 0x86}, {&(0x7f0000003380)="2f6a37b2f980e2558bac1f0e3bb867b7ac31ab784583d7cd3fe8ea14aa102048e2c329cb7252563b66a0dbf27bdba2a044097101e59ee1ec114fcc9c5469ae3cd75330a0660bfba83a73e123d5ed7abc86296588b2d542eb95eaa44615f83da057251973ae4cedbce77c1cb99ba198862bddf0e8964f629364db97af8db60e41bb74a3be00dfcd2369bf5d41d0e8874845ce05830c391f388056fa101b104ff8e5498fb409de49590d3fe29d2aa94d74fe32dc2d6fff35d57e954b1426e198a1ec21bd76020637b110fb118cf61f8d1b599f0e181759f98ecd3d1a86c0e6373ac0b81175fb02b2c3c30d0d379828df4d96e4ba", 0xf3}, {&(0x7f0000003ec0)="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", 0x1000}, {&(0x7f0000004ec0)="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", 0x1000}, {&(0x7f0000003480)="6d3e33cab39c0ea53e2c2d9a1f9923aa5cec24b83d6b95f50c8230f8c196d71bb2047615791d04c45604f27e0dfb3905729a745c368922dc9f00e077b782af603937702e8137bdb0539d75cd84fbc7fa3c9d8348b569aefbb374af61dcdfc37f513658d8c171a67332f4dbb892b15133965b69169a62b406a2f99f766ee4760cbdbea0e4ecb293d487129637703cf7cad2bd615f2ba780feaba09d646040ba938a5c65ab4fd8c52ec61e3defbffa09f8373e3a3725903701b29117bd4f158d5e3c9971216e3bd7b50f18fcbc100c", 0xce}], 0x9, &(0x7f0000003640)=[@assoc={0x18, 0x117, 0x4, 0xcaab}, @op={0x18, 0x117, 0x3, 0x1}], 0x30, 0x20000004}, {0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003680)="c390e9a0a84104c8f34089ac16f08320331ee896db315c607881979d8d0133b66762452630fb54794dbd41ee7f94efaa817e69ddfc4b331376258c0906d3997ade5faab3a158e6f65718b88f6e11be6d3c0f73e6594f15894af69049a0a31343fd04c1ad93705722", 0x68}, {&(0x7f0000003700)="6ef4097b8515f02a22b9f30a9314c8d7ad1f338bcc7cbe8380f54110b3003ddeeefc2c78ebb597756d7422d935bf41e4580bb32217bcd3b977f763e0cdbfd1d4a59e3b7f6828e45f270f2ac10eb4d2653a087a53c2a56ef219d2e166c272a3f7a253465c646d1ceaed4eab13d84b931bbf6b9c41ef66258823711a9a936aacabe642dfc6eae6e856be2090af4c", 0x8d}], 0x2, 0x0, 0x0, 0x8000}, {0x0, 0x0, &(0x7f0000003c80)=[{&(0x7f0000003800)="2512ac62c81c8110cedd1c9027dc5bc3b53724aa306201ff46424c3b434194873a2352658b01cbcc46f252fbd25ba57c2113f0696d37ea2e48b554f50b696ebaea0ab08c0ab92e41281b18436228722c67b85ced3871d67eda0e71bc743231f60c2057f43c50e9b85f5c82e1d01b87d32fecc73a0bbfeefdcb9b21a49a1e399b870eddac48ffaabee4304f2b4d6353d935856c568ad1040235f2eeab85e6ee9ce807e97e0fbee11e8458eb2ad99a6c33f3af679161057c82274313080364efde9bc59272767863ce18afb8dc2fa268ed434f2aba2733191729972fffef15be508048b8c2ad3aff99bdb80a12afd3dd31", 0xf0}, {&(0x7f0000003900)="ff8746fd8132f9d9173626deb3297b82efda", 0x12}, {&(0x7f0000003940)="036d98402befb3dc7b817758b2a0e2b0d7ec1b0c4f21e653fbf4715bd0c19a03b2d75a0a8b59cff2c3d39474d3c7d981dc5eee0e0bdf59bce670e8e9a75e691667d13798edd1f744bf2124534ab06ec2f683528106f31113d4a9bc25e078fa8295cb9191ef931ac8d13e7db76cbee88746618f39483260ae032a404187c800dc7d608bcb2619871697d242f1226d8bb4c5b8c9c90aac0d077b8d6c63aea389937046b05be7955ad4f6371c72c8064f2bbf276b2f28de5b19c764068a71ba92eb7631be991df48f11978fcf26873f4f11ed4c3a8559ed25e9e38560ddba65120714550f1ab4868b2bc5a321ee81ef1f", 0xef}, {&(0x7f0000003a40)="da22cf828d5529a9c2dfbf591ba21f6d78413f1a8505c2533c90a4ad59bcf87ec05be599e2cdae5ce83aca569884041d4880796c0bd3a2a6074aa763dc596e4e194971b0e2f264de6e28df8072bfc3bb25d9f5f43618dd761f34ea98b63611439be69037c21d566c84ec70ccc13ca01313", 0x71}, {&(0x7f0000005ec0)="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", 0x1000}, {&(0x7f0000003ac0)="947c9b", 0x3}, {&(0x7f0000003b00)="75224169dcbd1a9374f15cf176ea", 0xe}, {&(0x7f0000003b40)="4465e68b38d4f9f9451ae0706384ec2f30460811205f848a49504bd60587068d82dcadf1f0e6abd7e2d3372aacf5b7b7d6f905767aec57e1f3d26e588d3004d337e3db74f9fb5546caba", 0x4a}, {&(0x7f0000003bc0)="b59ef7674140ea2ef37cdf0e46a07605e358a5f7cada1a43d273b3df90abd6ce8723cbe91f54ac55d87a0b857cc803701a24d5acea7a16480fbc2ef7136fea29f9fb6622398f20f407685318a966e307ff78f0824ec1d74bf5a1774cbe47f70d045afba6dca9a214635a382acdfddd4b38fafb8f605dda1bfb0563a689b5ff348f14e9bed71ea12b3538dc9b1ce6d9cb2d63d16ca12dafa51b56a38908bdc62fd0db3da17fb828425b487815fa0654f9bd34ef67120c29", 0xb7}], 0x9, &(0x7f0000006ec0)=[@iv={0xe8, 0x117, 0x2, 0xd0, "9223c39a767b9fbbcf2e16d4d5e1e3c7ffacf434be6dca9b5664cbfd5f48fd721c075a8b241d473c97d11b079cebaf865c60a35430e8cdec20075d71b3dfc050a26607628cdc339ecaca4830cc5cef07d1094ff236a941f2101ea5af7d7bd808aa2cc1274d6ca96be6ec7dce4cf1f499581663e9992ee4044c2ef376a0919fe852c873fe396c669133c8dc290a1afc72555583588462fe3a7a4158dee3a312197b80d7ad910b1bbeeefd6445cf95bb2c9b0549063e2f73525b7796246469351d24a4e6e8f4e1d9831453e6d810a520ba"}, @assoc={0x18, 0x117, 0x4, 0xcf30}, @assoc={0x18, 0x117, 0x4, 0x3}, @iv={0xf8, 0x117, 0x2, 0xde, "d2b71a25d2b6f403a4156d809cd3933b9804b90207ed75feba0ffb8f914b6a08c73bcc8cf815b6c2d2c2a3bc39046ddf62a08ae43fbb1f898db5c304ef6a3cc058c6e41a32805c02933f0fd17ad4a43a10def961f1a8b76b55ae8dd2a0802b21a94bb2c9532a37c9dd21f1e5a43cb2c78d9d9dadd142192a039e41291277cf77358e3c2266f04903307e293ac6cc23deafb4c7b4cf49565cd6d228a62ec42cc3040b1ba07028ea7ac61a4a5794640e41e0f878d1704f42062dc3316fd4d445440d0a214feba33f24a835d5bef2e9b38f8163305288d6f6d931d0d7f9af25"}, @assoc={0x18, 0x117, 0x4, 0x1}, @assoc={0x18, 0x117, 0x4, 0x1f}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x270, 0x200000c1}], 0xa, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:27:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) [ 886.209738] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:42 executing program 0: r0 = open(&(0x7f0000000040)='./file1\x00', 0x400040, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) close(r0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001f00)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_delete(0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000200)={0xffffffffffff4b32, {{0xa, 0x4e23, 0x401, @mcast1, 0xfffffffffffffff8}}, 0x0, 0x1, [{{0xa, 0x4e24, 0x0, @remote}}]}, 0x110) 18:27:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xfffffff0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:42 executing program 4: socket$netlink(0x10, 0x3, 0x2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 18:27:42 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000280)={0x7, 0x4, 0x0, r1}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/loop-control\x00', 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000740)={@mcast1, @local, @ipv4={[], [], @multicast1}, 0x8, 0x0, 0xffffffff, 0x500}) getdents64(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendto$inet6(0xffffffffffffffff, 0x0, 0x100bb, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000180)='.\x00', 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:27:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 886.442946] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x30002, 0x0) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/20, 0x14}, {&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000200)=""/199, 0xc7}], 0x3, &(0x7f0000000340)=""/205, 0xcd}, 0x21) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000004c0)='trusted.overlay.nlink\x00', &(0x7f0000000500)={'L+', 0xfff}, 0x28, 0x3) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000480)={r2, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x72e) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x400, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000580)={0x0, 0x6, 0x30, 0x8, 0x81}, &(0x7f00000005c0)=0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000740)={r4, @in={{0x2, 0x4e22, @empty}}, [0xab56, 0x440, 0x9, 0x80000000, 0x44ab8000, 0x5, 0x0, 0x7fffffff, 0x1, 0x1ff, 0x2, 0xaa8b, 0x2, 0x432, 0x6]}, &(0x7f0000000700)=0x100) write$binfmt_elf64(r3, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000e9ffffff0040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r3, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:27:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xfffffdef}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:42 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/loop-control\x00', 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000740)={@mcast1, @local, @ipv4={[], [], @multicast1}, 0x8, 0x0, 0xffffffff, 0x500}) getdents64(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) sendto$inet6(0xffffffffffffffff, 0x0, 0x100bb, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000180)='.\x00', 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:27:42 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) rename(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file1\x00') removexattr(&(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)=@known='security.apparmor\x00') 18:27:42 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20000, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000000c0)={0x0, 0x81}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000890000000000000000000000000000000000"], 0x78) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100)=0x4, 0x8) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 886.860708] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000001e00000000004000000000000000000000000000000000000000f20000000000291bbc2fe8946c260000000000000000000000000000000000000000000000000000000000000000008f5adbd947dedac269000013000000008f353ecc00020000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00T\x00\x00\x00\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 18:27:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:43 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0xc2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:27:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="e5b3ef0ced5c0200b7", 0x9) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket$inet(0x2, 0x8000f, 0x800) setsockopt$inet_udp_int(r2, 0x11, 0x67, &(0x7f0000000080)=0x3, 0x4) [ 887.122107] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 887.133537] bond0: Releasing backup interface bond_slave_1 18:27:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x40000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000000000000000000000002b000000000000000000000000000000400000000000000000000000000000000000000000d98600000000000000000200000000000000000000000000000000000000000000000000000000000d0001000000000000000000000000000000000000000000000060369cea5088a0aed4eb99a4d6118cb01a2a623b635837d7b92b5c76bc572598f675144e58a45c0088e5ca40b9bb2b45d06987c932430750b03ff0eebab75896a84ac3086b8cf83e757ea0b5ea2aa96c7059022cca006773852b"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9, 0x420000) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000580)={@loopback, 0x0}, &(0x7f00000005c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000780)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000bc0)=0xe8) accept4(r1, &(0x7f0000000d40)=@hci={0x1f, 0x0}, &(0x7f0000000dc0)=0x80, 0x80800) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000280)=""/49) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000e00)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f00)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001000)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000012c0)={{{@in6=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000001040)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @remote}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000011c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000014c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000015c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'vcan0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001740)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000017c0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000003f40)={0x11, 0x0, 0x0}, &(0x7f0000003f80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000040c0)=0x21a) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000004800)={@loopback, @empty, 0x0}, &(0x7f0000004840)=0xc) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000005100)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10004004}, 0xc, &(0x7f00000050c0)={&(0x7f0000004880)={0x808, r3, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0x198, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x8, 0xf58, 0x0, 0x8}, {0x20, 0x800, 0x100000001, 0x7}, {0x8c8, 0x3, 0x7, 0x4}, {0x20, 0x3, 0x20, 0x10000}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x9, 0x7, 0x100000000, 0x26}, {0x1778000, 0x7fffffff, 0x401, 0xe32a}, {0xfffffffffffffff8, 0x8, 0x1, 0x1}, {0x3, 0x3, 0x1, 0xfff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x75a0}}}]}}, {{0x8, 0x1, r6}, {0x150, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x8, 0xbfa3, 0x20, 0x1}, {0x3, 0x0, 0x0, 0x24f72d6c}, {0x1, 0xf2, 0x4, 0x3ff}, {0x2, 0x80000000, 0x6, 0x9}, {0x2, 0xfffffffffffffffd, 0x6, 0x4}, {0x400, 0x26b8, 0xfffffffffffffffa, 0xff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}]}}, {{0x8, 0x1, r9}, {0x7c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x1b4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r13}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x22}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x4, 0xffffffffffff8001, 0x401, 0x4}, {0x1, 0x200, 0x2, 0x4}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r14}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r15}, {0x80, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x754}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x1e8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}]}}]}, 0x808}, 0x1, 0x0, 0x0, 0x800}, 0x0) 18:27:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x800, 0xe1) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0xd}, 0x3}, {0xa, 0x4e24, 0x3, @loopback, 0x10000}, 0x4, [0x20, 0x7, 0x9, 0x1ff, 0xd6, 0x8000, 0x7ff, 0xffffffff]}, 0x5c) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$apparmor_current(r1, &(0x7f0000000140)=@hat={'changehat ', 0x2, 0x5e, ['skcipher\x00', 'ecb-twofish-avx\x00', '\x00', '++\x00', 'skcipher\x00', '\x00']}, 0x44) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 887.608293] bond0: Enslaving bond_slave_1 as an active interface with an up link 18:27:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x800, 0x8000) ioctl$KDSKBLED(r2, 0x4b65, 0xe) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x2) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 887.723050] bond0: Releasing backup interface bond_slave_1 [ 887.998755] bond0: Enslaving bond_slave_1 as an active interface with an up link 18:27:44 executing program 0: creat(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="1c"], 0x0, &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 18:27:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x20, 0x0, 0x4829378c, 0x8, 0x0, 0x3, 0x4, 0x8, 0x6, 0x6, 0xfffffffffffffff7, 0x45e, 0x5, 0x1, 0xfffffffffffff23a, 0x4, 0x1ff, 0x3f, 0x40000, 0x0, 0x882a, 0x2885, 0x7ff, 0x1, 0x1, 0x7f9488e5, 0x59, 0x4, 0xff, 0x80000001, 0x0, 0x8bf, 0x7, 0x993, 0xfff, 0x100000000, 0x0, 0x80000000, 0x2, @perf_config_ext={0xfa, 0x3}, 0x24042, 0x8, 0x1, 0x2, 0x4, 0x200, 0x6346}, r1, 0x7, 0xffffffffffffff9c, 0x3) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000080)={'nr0\x00\x00\x00\x00\x00\x03\x00', 0x80}) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x1000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:44 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0xc2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:44 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 888.110766] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xfff) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000001c0)={0x80, 0x0, 0x8, 0x6, 0x100, 0x4, 0x1, 0x4, 0x1, 0x100000001, 0x7}, 0xb) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xcf) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x101, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x8000, 0x130) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev, @multicast2}, &(0x7f0000000140)=0xfdf7) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000240)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7]}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[], 0x0, 0x1a200}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:27:44 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 888.262748] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x2000000000}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:44 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:27:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x17b}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:44 executing program 0: mmap(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x3, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x16) [ 888.492266] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f00000000c0), 0x1, 0x0, 0x0) 18:27:45 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0xc2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:27:45 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x242400, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f00000000c0)={0x2, "bcac"}, 0x3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x2000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 888.893757] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x88a1a07bc87bf06e) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0xf, 0x8, "bf8e7bad12d3fc61dda140612044de8bfd58d277c367bac41bf090e4e1f2d5a465c7bab82a339284598a2212d3c92446b7e87592da543c2b030249368db6068e", "260c83920abde0d5b19a49eb59f37d3afe3c1cf1239703405c7dfb6feed791ce", [0x0, 0x6]}) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x81, 0x1, 0x4, 0x9b6, 0x1f, 0x800, 0x100, {0x0, @in6={{0xa, 0x4e21, 0x84, @mcast2}}, 0xc4a, 0x7ff, 0x1000, 0x6, 0xfffffffffffffff7}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000000c0)={r4, 0x5, 0x30, 0x1, 0x6}, &(0x7f0000000200)=0x18) accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='ecb-twofish-avx\x00'}, 0x30) syz_open_procfs(r5, &(0x7f00000003c0)='net/ip6_tables_targets\x00') write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYRESDEC], 0xfffffd83) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:27:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x7ffffffff000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 889.026320] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000006f337f7f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:45 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) rename(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file1\x00') 18:27:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:27:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dsp\x00', 0x40, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000740)={{0x6000, 0x0, 0xa, 0x7, 0x1, 0x3, 0x8b8e, 0x9, 0x0, 0x0, 0x8, 0x1}, {0x0, 0x1d000, 0xe, 0x0, 0x93e8, 0x2, 0x7f, 0xffffffff80000001, 0x5, 0x4, 0x903, 0x20}, {0xf000, 0x10000, 0xd, 0x7, 0x7fff, 0xfff, 0x10001, 0x2, 0x3, 0x738b, 0xc3c1dd2, 0x5}, {0x0, 0x7000, 0xa, 0x5, 0xffff, 0x800, 0x9, 0x33, 0x3, 0xe8, 0x0, 0x100000000}, {0x100001, 0x2000, 0xf, 0x0, 0x1ff, 0x1000, 0x1ff, 0x40, 0x81, 0x69, 0x365d, 0x101}, {0x0, 0xd001, 0xf, 0xfff, 0x9, 0x80000001, 0x73, 0x9, 0x8, 0x7ff, 0x0, 0x6}, {0x5000, 0x4000, 0x9, 0x9, 0x7, 0x81, 0x3, 0x5, 0x3, 0x8000, 0x7, 0xe8}, {0x4001, 0x100000, 0xd, 0x6, 0x6, 0xa16f, 0x1, 0x1, 0xffffffff, 0x10000, 0x2, 0x100}, {0x5000, 0x1d000}, {0x4001}, 0xe0010023, 0x0, 0x3002, 0x80, 0xd, 0x8400, 0x7000, [0x400, 0x5, 0x9, 0x3]}) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x9, 0x200) recvmsg(r1, &(0x7f00000006c0)={&(0x7f0000000440)=@can, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/111, 0x6f}, {&(0x7f0000000540)=""/128, 0x80}, {&(0x7f00000005c0)=""/130, 0x82}], 0x4}, 0x2) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000340)={0x0, 0x312a}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000003c0)={r4, 0x398b}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x1, 0x10000}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000200)={r5, 0xcb, "93b61c82304495a7ff50e3cd56cf399bc3009c5c0d5be3cfc7fa67bd2a86d42a810c5f4913f18b079e84ce9f321dcd684295e006230080cb6e72bfdbbe8646533f7319a3f3beb2c4956a4628597243c79c1e9d9a088b85ad7608d1a8095ccbda2fcf824c82ca30e418443cbeee878c89e9ebede61436f45a3caa5c6381aaa15985413e8fb9fd954ed3df6afff69ee7024696facd67b439969eb0ef2a9c6cf129346f88d7ea6e622c29e80eb767ad65fb9921e0aca9f83e68bfeca178e92fa30d15826c03fdf69c230d90e2"}, &(0x7f0000000300)=0xd3) 18:27:45 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0xc2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x8}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 889.438721] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x403d, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000100)={0x7}) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000003c0)="0f20c035100000000f22c0c4c1f87766baf80cb8aedf018fef66bafc0c66ed0f01ef8149000f00000036f30f2000c4c37962530782670fc75b39643e2e0f01cf66baf80cb86c5fbb8aef66bafc0c66b8e07166ef", 0x54}], 0x1, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r3, 0xae03, 0x7fffffff) seccomp(0x0, 0x1, &(0x7f0000000080)={0x0, 0x0}) 18:27:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 889.624618] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:27:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 889.823076] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = gettid() capset(&(0x7f0000000080)={0x20071026, r2}, &(0x7f00000000c0)={0xfea, 0x2, 0xf2e, 0xffff, 0xffffffff7fffffff, 0x1}) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f4500000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) fcntl$setstatus(r0, 0x4, 0x400) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@alg, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/235, 0xeb}, {&(0x7f00000002c0)=""/39, 0x6}], 0x2, &(0x7f0000000340)=""/190, 0xbe}, 0x2) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000001340)={0x0, 0x0, 0x2080}) 18:27:46 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 890.075310] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:46 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0xc2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x200000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0/file1\x00', 0x0) rename(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file1\x00') 18:27:46 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:27:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000200)=[@in6={0xa, 0xfffffffffffffff7, 0x7f, @mcast2, 0xffffffff}, @in6={0xa, 0x4e24, 0x2, @local}, @in6={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, @in6={0xa, 0x4e23, 0xa900000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e24, 0x2, @ipv4={[], [], @local}, 0x7}], 0x9c) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)) pipe2$9p(&(0x7f0000000140), 0x84800) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 890.314060] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="0000ff000a000200aaaa00004a9c498f13e891cbe34a513754d29ebe54d1a1496e4e18bbafad07171e0ce0cca0373349b8196a09f962954d38a35466bb81ae179193140d7c022b2cdc880e259e4d600edf01be5ca29b65cec4519aa813c2d9cfae"], 0x1}}, 0x0) 18:27:46 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 890.495156] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000034000)={0x0, 0x0, 0xf7fffffffffffffe}, 0x4) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'\x03\x00\x00\x00\x00\x00\xaf\x00', 0x1000e803}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) 18:27:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f00000000c0)={0x6, 0x4004}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000006bac1ad56bf70b59d3d1550000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x1000000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:27:47 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0xc2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = accept$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x1, 0xfffffffffffffeff, 0x5, 0x401, 0x8bf}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e24, @multicast2}}, 0x3959825f, 0x7fff}, &(0x7f0000000280)=0x90) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c4600000000000000b2000000000000000010000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:47 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 18:27:47 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0xc2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000440)=[@text64={0x40, &(0x7f0000000180)="b9be0a00000f3266b816000f00d066b887000f00d00f1a5b71430f01330f01c8440f01df0f20d835200000000f22d88f69e093550b6766410f383f0b", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000], 0x1f003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 891.199240] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:27:47 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0xc2) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000006c00)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)=""/221, 0xdd}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000240)=""/238, 0xee}, {&(0x7f0000000340)=""/119, 0x77}, {&(0x7f00000003c0)=""/89, 0x59}, {&(0x7f0000000440)=""/79, 0x4f}, {&(0x7f00000004c0)=""/28, 0x1c}, {&(0x7f0000000500)=""/29, 0x1d}, {&(0x7f0000000540)=""/221, 0xdd}], 0x9, &(0x7f0000000700)=""/163, 0xa3}, 0x6}, {{&(0x7f00000007c0)=@pppol2tpv3, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000900)=""/139, 0x8b}, {&(0x7f00000009c0)=""/111, 0x6f}, {&(0x7f0000000a40)=""/201, 0xc9}, {&(0x7f0000000880)}, {&(0x7f0000000b40)=""/80, 0x50}], 0x6, &(0x7f0000002340)=""/4096, 0x1000}, 0x9}, {{&(0x7f0000000c40)=@x25={0x9, @remote}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000cc0)=""/131, 0x83}, {&(0x7f0000000d80)=""/52, 0x34}, {&(0x7f0000000dc0)=""/203, 0xcb}], 0x3}, 0x2}, {{&(0x7f0000000f00)=@llc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)=""/59, 0x3b}, {&(0x7f0000003340)=""/195, 0xc3}, {&(0x7f0000000fc0)=""/78, 0x4e}, {&(0x7f0000003440)=""/239, 0xef}], 0x4, &(0x7f0000003540)=""/228, 0xe4}, 0x7}, {{&(0x7f00000011c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000003800)=[{&(0x7f0000003640)=""/239, 0xef}, {&(0x7f0000001240)=""/49, 0x31}, {&(0x7f0000003740)=""/147, 0x93}], 0x3, &(0x7f0000003ec0)=""/4096, 0x1000}, 0x100000000000000}, {{&(0x7f0000003840)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f00000038c0), 0x0, &(0x7f0000003900)=""/227, 0xe3}, 0xbba5}, {{&(0x7f0000003a00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000003a80)=""/73, 0x49}, {&(0x7f0000003b00)=""/148, 0x94}, {&(0x7f0000003bc0)=""/124, 0x7c}, {&(0x7f0000003c40)=""/75, 0x4b}, {&(0x7f0000003cc0)=""/70, 0x46}, {&(0x7f0000004ec0)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/119, 0x77}], 0x7, &(0x7f0000005ec0)=""/184, 0xb8}, 0x2f}, {{&(0x7f0000005f80)=@caif=@dbg, 0x80, &(0x7f0000006600)=[{&(0x7f0000006000)=""/235, 0xeb}, {&(0x7f0000006100)=""/124, 0x7c}, {&(0x7f0000006180)=""/233, 0xe9}, {&(0x7f0000006280)=""/252, 0xfc}, {&(0x7f0000003e40)=""/54, 0x36}, {&(0x7f0000006380)=""/59, 0x3b}, {&(0x7f00000063c0)=""/92, 0x5c}, {&(0x7f0000006440)=""/46, 0x2e}, {&(0x7f0000006480)=""/247, 0xf7}, {&(0x7f0000006580)=""/111, 0x6f}], 0xa}, 0x1f}, {{&(0x7f00000066c0)=@hci, 0x80, &(0x7f0000006ac0)=[{&(0x7f0000006740)=""/207, 0xcf}, {&(0x7f0000006840)=""/224, 0xe0}, {&(0x7f0000006940)=""/97, 0x61}, {&(0x7f00000069c0)=""/144, 0x90}, {&(0x7f0000006a80)=""/33, 0x21}], 0x5, &(0x7f0000006b40)=""/138, 0x8a}, 0xfff}], 0x9, 0x40, &(0x7f0000006e40)={0x77359400}) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000190000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 891.438313] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:27:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x2}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:47 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r2, 0xae80, 0x8000000000000000) 18:27:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x3aa) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 891.723291] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:27:48 executing program 3: mkdir(&(0x7f0000000440)='./file0\x00', 0xc2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = open(&(0x7f0000000380)='./file0\x00', 0x7fffd, 0x100000000000003c) r2 = request_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='lo\x00', 0xfffffffffffffffd) r3 = request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='skcipher\x00', 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0x5, r3) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x3b, 0x7, 0x4, 0x6, 0x7, 0x4, 0x3, 0xae, 0xffffffffffffffff}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x60, 0x240080) r4 = accept$alg(r0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000340)={'gre0\x00', {0x2, 0x4e20, @multicast1}}) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) write$binfmt_elf64(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x78) recvmmsg(r4, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000440), 0x1000000000000154}, 0xffffffffffffffff}], 0x1, 0x2, 0x0) 18:27:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000440)='./file0\x00', 0xc2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) stat(0x0, 0x0) truncate(0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) [ 892.014816] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000000c0)={0xc1b, 0xe0}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000fbff0000fcced455a7709aa30b000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000100000000000000000008831519c000000f5ff00009c658dbe07bd106b8c72829243f90000000000000000000000000000000000000000000000000000000093ed4be18659484a732e13498c892c80d538a9c8e7ae077d784cf5f444867fa026ed18c38381c6f83e71fa2f8f71"], 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xffffff8d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:27:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x408100, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0xe) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) 18:27:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0xaa08, 0xffff, 0x40, 0x4000400000000, 0x3}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x18000, 0x0) r3 = mmap$binder(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000000, 0x46830, r2, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000140)={r3}) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 892.275239] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:48 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(0x0, 0xc2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:27:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) fanotify_init(0x7a, 0x401) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x581dc41d8c3fa72) r1 = accept$alg(r0, 0x0, 0x0) setitimer(0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, &(0x7f00000000c0)) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) faccessat(r1, &(0x7f0000000500)='./file0\x00', 0x8, 0x1000) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) uselib(&(0x7f0000000380)='./file0\x00') sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02000000020000000000000000000000"], 0x10}}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x0, 0x1000, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0x0, 0xffffffff]}) 18:27:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xffffffff00000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:49 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x2c3, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:49 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:27:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:49 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:27:49 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:27:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "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"}, 0x183) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 893.421962] device bridge_slave_1 left promiscuous mode [ 893.434856] bridge0: port 2(bridge_slave_1) entered disabled state 18:27:49 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0xeffdffff) [ 893.504676] device bridge_slave_0 left promiscuous mode 18:27:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x8000000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 893.563568] bridge0: port 1(bridge_slave_0) entered disabled state 18:27:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2, 0x8, 0x10}, 0xc) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000240)={r4, 0x80, 0x3, 0x5e3}, &(0x7f0000000280)=0x10) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r0, 0x5452, &(0x7f0000000280)=0x7f) shutdown(r0, 0x0) 18:27:49 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0xfffffffffffffdd3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000b80)="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", 0xfffffffffffffdc6) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0xfffffffffffffe96, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:50 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000017f07)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @loopback}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x4}}}}}}, 0x0) [ 893.955003] team0 (unregistering): Port device team_slave_1 removed [ 893.998186] team0 (unregistering): Port device team_slave_0 removed [ 894.029756] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 894.045897] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 894.101216] bond0 (unregistering): Released all slaves [ 894.546741] IPVS: ftp: loaded support on port[0] = 21 [ 895.577176] chnl_net:caif_netlink_parms(): no params data found [ 895.792957] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.799397] bridge0: port 1(bridge_slave_0) entered disabled state [ 895.806939] device bridge_slave_0 entered promiscuous mode [ 895.839261] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.846190] bridge0: port 2(bridge_slave_1) entered disabled state [ 895.853471] device bridge_slave_1 entered promiscuous mode [ 895.944754] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 895.979316] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 896.070909] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 896.078177] team0: Port device team_slave_0 added [ 896.108312] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 896.115669] team0: Port device team_slave_1 added [ 896.146165] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 896.178176] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 896.294506] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 896.324842] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 896.624080] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 897.751482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 897.867356] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 897.981920] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 897.988120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 897.996821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 898.104741] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 898.110853] 8021q: adding VLAN 0 to HW filter on device team0 [ 898.221953] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 898.229022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 898.237645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 898.245796] bridge0: port 1(bridge_slave_0) entered blocking state [ 898.252237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 898.259516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 898.360904] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 898.368057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 898.379202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 898.387337] bridge0: port 2(bridge_slave_1) entered blocking state [ 898.393777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 898.497104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 898.504447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 898.615333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 898.622671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 898.750581] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 898.757623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 898.770151] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 898.778490] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 898.887218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 898.894351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 898.903251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 899.005061] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 899.012114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 899.019841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 899.128942] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 899.136369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 899.145677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 899.650684] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 899.870400] 8021q: adding VLAN 0 to HW filter on device batadv0 18:27:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:56 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 18:27:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x200000, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f00000000c0)={'ip6erspan0\x00', 0xed4}) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x2e, 0x4) preadv(r1, &(0x7f0000000300)=[{&(0x7f0000000140)=""/127, 0x7f}, {&(0x7f00000001c0)=""/14, 0xe}, {&(0x7f0000000200)=""/179, 0xb3}, {&(0x7f00000002c0)=""/40, 0x28}], 0x4, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000340)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:56 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:27:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xf0ffffff7f0000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 900.014612] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000240)={r3, 0x1, 0x6, @dev={[], 0x2a}}, 0x10) bind(r0, &(0x7f0000000280)=@x25={0x9, @remote={[], 0x0}}, 0x80) 18:27:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:56 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 900.163789] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c46000001000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000008ac60021360000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:56 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 900.328108] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:57 executing program 0: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x400000}) 18:27:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000007b2a4e3b51f6e23000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000"], 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x33, 0x0, 0x0) 18:27:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:27:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 900.935151] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x800, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000200)={@l2={0x1f, 0x1, {0x8, 0x3ff, 0x6, 0x7f, 0x81, 0x200}, 0x1000, 0x2}, {&(0x7f00000002c0)=""/135, 0x87}, &(0x7f00000000c0), 0xed1bc2b271ab2ca5}, 0xa0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) connect$l2tp(r2, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x2, 0x3, 0x3, 0x1, {0xa, 0x4e20, 0x4, @ipv4={[], [], @multicast2}, 0xe6d}}}, 0x32) write$smack_current(r2, &(0x7f0000000180)='\x00', 0x1) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:27:57 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 18:27:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) connect(r0, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @multicast1}, 0x0, 0x0, 0x4, 0x4}}, 0x80) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 901.126514] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000180)=0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a06759a2500000017d372b50ad2873a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff7f000000"], 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:27:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) [ 901.354696] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:57 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) tkill(r0, 0x16) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 901.552576] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:57 executing program 0: r0 = shmget(0x1, 0x4000, 0x200, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x5000)=nil, 0x7000) r1 = getpgid(0x0) r2 = getpgrp(0xffffffffffffffff) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) r4 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) kcmp(r1, r2, 0x3, r3, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/10) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) alarm(0x6) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x13, &(0x7f0000000380), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ff1000/0x7000)=nil, 0x7000, &(0x7f0000000380)=""/4096) r8 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r8, 0x2271, &(0x7f0000000140)) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$SG_GET_ACCESS_COUNT(r8, 0x2289, &(0x7f00000000c0)) shmctl$IPC_RMID(r0, 0x0) 18:27:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000c2717dfc000000000000000000000000400000000000000069e5000000000000000000008e1fb5cb000000000000000000000000000000000000000000000000000000000000000000000e0000000000000000000000000000000000000000000000000000000000"], 0x78) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x801) sendmsg$nl_netfilter(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x3, 0x100, 0x70bd28, 0x25dfdbfb, {0x3}, [@typed={0xc, 0x8, @u64=0x8}, @generic="d52d91300d239b53989456721b6c4001957e401ca2519b55b873668953c20cf74f70188abbba6ffdca867f7e9fb5fd393f24c97b800d9284c367f6bb04ef02"]}, 0x60}, 0x1, 0x0, 0x0, 0x20008010}, 0x10) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 18:27:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:27:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 901.823535] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 901.852289] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:58 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x3f, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000680)={0x1, @sliced}) 18:27:58 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 902.021742] *** Guest State *** [ 902.042374] CR0: actual=0x0000000080000039, shadow=0x00000000e0000019, gh_mask=fffffffffffffff7 [ 902.102092] CR4: actual=0x0000000000002070, shadow=0x0000000000000030, gh_mask=ffffffffffffe871 [ 902.110988] CR3 = 0x0000000000004000 [ 902.161570] PDPTR0 = 0x00000000000000e7 PDPTR1 = 0x0000000000000000 [ 902.191384] PDPTR2 = 0x0000000000000000 PDPTR3 = 0x0000000000000000 [ 902.198003] RSP = 0x0000000000000f6e RIP = 0x000000000000912c [ 902.211319] RFLAGS=0x00000006 DR7 = 0x0000000000000400 [ 902.217371] Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 [ 902.241239] CS: sel=0x0010, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 902.249338] DS: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 [ 902.271516] SS: sel=0x0038, attr=0x04093, limit=0x0000ffff, base=0x0000000000000000 [ 902.298951] ES: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 18:27:58 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:27:58 executing program 4: 18:27:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:58 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:27:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 902.317419] FS: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 [ 902.395400] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 902.406388] GS: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 [ 902.447503] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 902.488256] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 902.530585] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 902.557699] TR: sel=0x00d0, attr=0x0008b, limit=0x000001ff, base=0x0000000000004e00 [ 902.579559] EFER = 0x0000000000000001 PAT = 0x0007040600070406 [ 902.605808] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 902.620899] Interruptibility = 00000000 ActivityState = 00000000 [ 902.636529] *** Host State *** [ 902.640076] RIP = 0xffffffff811fd350 RSP = 0xffff888027e5f3f0 [ 902.666669] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 902.686893] FSBase=00007fe16234c700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 902.710847] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 902.740401] CR0=0000000080050033 CR3=000000009f2d2000 CR4=00000000001426e0 [ 902.768050] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 902.793295] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 902.832493] *** Control State *** [ 902.840663] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 902.862133] EntryControls=0000d1ff ExitControls=002fefff [ 902.868878] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 902.882744] VMEntry: intr_info=00000306 errcode=00000000 ilen=00000000 18:27:59 executing program 0: r0 = shmget(0x1, 0x4000, 0x200, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x5000)=nil, 0x7000) r1 = getpgid(0x0) r2 = getpgrp(0xffffffffffffffff) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) r4 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) kcmp(r1, r2, 0x3, r3, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/10) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) alarm(0x6) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x13, &(0x7f0000000380), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ff1000/0x7000)=nil, 0x7000, &(0x7f0000000380)=""/4096) r8 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r8, 0x2271, &(0x7f0000000140)) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$SG_GET_ACCESS_COUNT(r8, 0x2289, &(0x7f00000000c0)) shmctl$IPC_RMID(r0, 0x0) 18:27:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:59 executing program 4: 18:27:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:27:59 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 902.898231] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 902.907344] reason=80000021 qualification=0000000000000002 [ 902.918424] IDTVectoring: info=00000000 errcode=00000000 [ 902.926408] TSC Offset = 0xfffffe1aaecb4de6 [ 902.930865] EPT pointer = 0x000000005c05001e 18:27:59 executing program 4: [ 903.008973] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 903.163800] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:27:59 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 18:27:59 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:27:59 executing program 4: 18:27:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 903.224907] *** Guest State *** [ 903.228218] CR0: actual=0x0000000080000039, shadow=0x00000000e0000019, gh_mask=fffffffffffffff7 18:27:59 executing program 4: [ 903.276360] CR4: actual=0x0000000000002070, shadow=0x0000000000000030, gh_mask=ffffffffffffe871 [ 903.301032] CR3 = 0x0000000000004000 [ 903.317879] PDPTR0 = 0x00000000000000e7 PDPTR1 = 0x0000000000000000 [ 903.345249] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 903.361795] PDPTR2 = 0x0000000000000000 PDPTR3 = 0x0000000000000000 [ 903.411789] RSP = 0x0000000000000f6e RIP = 0x000000000000912c [ 903.417852] RFLAGS=0x00000006 DR7 = 0x0000000000000400 [ 903.446742] Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 [ 903.464800] CS: sel=0x0010, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 903.479915] DS: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 [ 903.500057] SS: sel=0x0038, attr=0x04093, limit=0x0000ffff, base=0x0000000000000000 [ 903.511483] ES: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 [ 903.524712] FS: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 [ 903.533299] GS: sel=0x0000, attr=0x100f3, limit=0x0000ffff, base=0x0000000000000000 [ 903.541486] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 903.549615] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 903.557814] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 903.565862] TR: sel=0x00d0, attr=0x0008b, limit=0x000001ff, base=0x0000000000004e00 [ 903.573977] EFER = 0x0000000000000001 PAT = 0x0007040600070406 [ 903.580369] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 903.587875] Interruptibility = 00000000 ActivityState = 00000000 [ 903.594144] *** Host State *** [ 903.597346] RIP = 0xffffffff811fd350 RSP = 0xffff88804f32f3f0 [ 903.603515] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 903.609928] FSBase=00007fe16236d700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 903.617789] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 903.623832] CR0=0000000080050033 CR3=0000000097e4e000 CR4=00000000001426e0 [ 903.630863] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 903.637609] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 903.643720] *** Control State *** [ 903.647179] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 903.654527] EntryControls=0000d1ff ExitControls=002fefff 18:27:59 executing program 0: r0 = shmget(0x1, 0x4000, 0x200, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x5000)=nil, 0x7000) r1 = getpgid(0x0) r2 = getpgrp(0xffffffffffffffff) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) r4 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) kcmp(r1, r2, 0x3, r3, r4) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/10) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) alarm(0x6) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x13, &(0x7f0000000380), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ff1000/0x7000)=nil, 0x7000, &(0x7f0000000380)=""/4096) r8 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r8, 0x2271, &(0x7f0000000140)) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$SG_GET_ACCESS_COUNT(r8, 0x2289, &(0x7f00000000c0)) shmctl$IPC_RMID(r0, 0x0) 18:27:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:27:59 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:27:59 executing program 4: 18:27:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 903.659969] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 903.666972] VMEntry: intr_info=00000306 errcode=00000000 ilen=00000000 [ 903.673721] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 903.680290] reason=80000021 qualification=0000000000000002 [ 903.687054] IDTVectoring: info=00000000 errcode=00000000 [ 903.692642] TSC Offset = 0xfffffe1a08e14838 [ 903.696979] EPT pointer = 0x00000000a0f0001e 18:27:59 executing program 4: [ 903.786633] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:00 executing program 4: 18:28:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:00 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[], 0x0) 18:28:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:00 executing program 0: 18:28:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:00 executing program 0: 18:28:00 executing program 4: 18:28:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:00 executing program 4: [ 904.343592] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:00 executing program 0: 18:28:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:00 executing program 4: 18:28:00 executing program 0: [ 904.551808] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) 18:28:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:01 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:01 executing program 4: 18:28:01 executing program 0: 18:28:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:01 executing program 0: 18:28:01 executing program 4: 18:28:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 905.104830] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:01 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:28:01 executing program 4: 18:28:01 executing program 0: [ 905.248357] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b76"], 0x6d) 18:28:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:02 executing program 0: 18:28:02 executing program 4: 18:28:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:02 executing program 0: [ 905.950252] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:02 executing program 4: 18:28:02 executing program 0: 18:28:02 executing program 4: 18:28:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 906.087413] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd60"], 0xa3) 18:28:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:02 executing program 0: 18:28:02 executing program 4: 18:28:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:03 executing program 4: 18:28:03 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x242, 0x0, 0x0, 0x0, 0x28f}}], 0x400000000000091, 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) [ 906.868373] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x100000fe}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 18:28:03 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0xf957, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002c00)=""/125, 0x7d}}], 0x1, 0x0, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000280)={0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/loop-control\x00', 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x1) syz_open_procfs(0x0, 0x0) [ 907.008495] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffd"], 0xbe) 18:28:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:03 executing program 4: socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x9f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:28:03 executing program 0: socket$packet(0x11, 0x2, 0x300) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000680)={'\x03\x00\x00\x00\x00\x00\xaf\x00', 0x1000e803}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r0, r3, 0x0, 0x800000000024) 18:28:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) fanotify_init(0x7a, 0x401) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x581dc41d8c3fa72) r1 = accept$alg(r0, 0x0, 0x0) setitimer(0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, &(0x7f00000000c0)) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 907.735873] ptrace attach of "/root/syz-executor4"[17487] was attempted by "/root/syz-executor4"[17489] [ 907.742740] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 907.781889] device lo left promiscuous mode 18:28:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x20102) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000740)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000780)={0x11, 0x19, r3, 0x1, 0xa03d, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x14) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000040000000000000000000e9ff000000000000000000003800008c0a000000200000000000000000000000000000000000000015b6a8cd5ca022f6ab939870000000000000000000000000000000000000000000"], 0x78) socketpair(0x2, 0x3, 0xb, &(0x7f0000000080)) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 907.898422] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:28:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8001, 0x2) r4 = getegid() ioctl$TUNSETGROUP(r3, 0x400454ce, r4) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_GET_API_VERSION(r5, 0xae00, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 907.945248] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 907.978701] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 18:28:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 908.016154] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:28:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) userfaultfd(0x800) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) time(&(0x7f0000000040)) [ 908.157734] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 18:28:04 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c"], 0xcc) 18:28:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x4000) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8, 0x200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xb4) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) close(r2) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x189001, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_getscheduler(0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) eventfd(0x0) io_submit(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:28:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x5, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 908.583837] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:28:04 executing program 4 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 908.742634] FAULT_INJECTION: forcing a failure. [ 908.742634] name failslab, interval 1, probability 0, space 0, times 0 [ 908.775031] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 908.785496] CPU: 0 PID: 17549 Comm: syz-executor4 Not tainted 4.20.0+ #395 [ 908.792543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 908.801902] Call Trace: [ 908.804519] dump_stack+0x1d3/0x2c6 [ 908.808175] ? dump_stack_print_info.cold.1+0x20/0x20 [ 908.813401] ? print_usage_bug+0xc0/0xc0 [ 908.817491] should_fail.cold.4+0xa/0x17 [ 908.821573] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 908.826711] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 908.832289] ? check_preemption_disabled+0x48/0x280 [ 908.837349] ? graph_lock+0x270/0x270 [ 908.841159] ? up_read_non_owner+0x100/0x100 [ 908.845585] ? find_held_lock+0x36/0x1c0 [ 908.849855] ? ___might_sleep+0x1ed/0x300 [ 908.854011] ? arch_local_save_flags+0x40/0x40 [ 908.858619] ? lock_release+0xa00/0xa00 [ 908.862635] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 908.868197] __should_failslab+0x124/0x180 [ 908.872454] should_failslab+0x9/0x14 [ 908.876300] kmem_cache_alloc+0x2c4/0x730 [ 908.880468] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 908.886039] ? _copy_from_user+0xdf/0x150 [ 908.886203] io_submit_one+0x1b7/0x1070 [ 908.886223] ? aio_poll+0x14a0/0x14a0 [ 908.898138] ? __might_fault+0x12b/0x1e0 [ 908.902221] ? lock_downgrade+0x900/0x900 [ 908.906388] ? lock_release+0xa00/0xa00 [ 908.910373] ? arch_local_save_flags+0x40/0x40 [ 908.915046] ? blk_lld_busy+0xa0/0xa0 [ 908.918881] __x64_sys_io_submit+0x1bd/0x5c0 [ 908.923305] ? __ia32_sys_io_destroy+0x580/0x580 [ 908.928075] ? trace_hardirqs_on+0xbd/0x310 [ 908.932422] ? __ia32_sys_read+0xb0/0xb0 [ 908.936498] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 908.941874] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 908.947348] do_syscall_64+0x1b9/0x820 [ 908.951273] ? __ia32_sys_io_destroy+0x580/0x580 [ 908.956084] ? do_syscall_64+0x1b9/0x820 [ 908.960154] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 908.965537] ? syscall_return_slowpath+0x5e0/0x5e0 [ 908.970500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 908.975357] ? trace_hardirqs_on_caller+0x310/0x310 [ 908.980387] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 908.985419] ? prepare_exit_to_usermode+0x291/0x3b0 [ 908.990456] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 908.995320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.000515] RIP: 0033:0x4579b9 [ 909.003732] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 909.022640] RSP: 002b:00007fe2428fec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 909.022657] RAX: ffffffffffffffda RBX: 00007fe2428fec90 RCX: 00000000004579b9 18:28:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:05 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 909.022666] RDX: 0000000020000600 RSI: 0000000000001400 RDI: 00007fe2428de000 [ 909.022676] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 909.022688] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2428ff6d4 [ 909.052237] R13: 00000000004beedf R14: 00000000004d0288 R15: 0000000000000005 18:28:05 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95c"], 0xd3) 18:28:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r2 = getpgid(0x0) rt_tgsigqueueinfo(r1, r2, 0x1a, &(0x7f0000000140)={0x18, 0x80000001, 0xfffffffffffff001}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r4 = syz_open_dev$media(0x0, 0x1f, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000340)) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000480)={0x11, @multicast2, 0x4e22, 0x4, 'sh\x00', 0x8, 0x81, 0x2b}, 0x2c) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() fstat(r0, &(0x7f00000008c0)) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='syst\x02\x00Opos\xa2ix_acl_access', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, 0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x48, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x2, @empty, 0x7}, @in6={0xa, 0x4e23, 0x20, @remote, 0x1}, @in={0x2, 0x4e22, @multicast2}]}, 0x0) geteuid() getegid() ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000940)={0x0, 0x0, [], @bt={0x7, 0x0, 0x0, 0x9, 0x8, 0x8, 0x0, 0x4}}) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000400)) write$binfmt_misc(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="05797716"], 0x1200e) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r7, 0x4) process_vm_writev(0x0, &(0x7f0000000100), 0x0, &(0x7f0000121000), 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000300)) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000000c0)) syz_open_dev$video4linux(0x0, 0x0, 0x8400) 18:28:05 executing program 4 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 909.469248] FAULT_INJECTION: forcing a failure. [ 909.469248] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 909.481150] CPU: 1 PID: 17579 Comm: syz-executor4 Not tainted 4.20.0+ #395 [ 909.488174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.497567] Call Trace: [ 909.500186] dump_stack+0x1d3/0x2c6 [ 909.503836] ? dump_stack_print_info.cold.1+0x20/0x20 [ 909.509064] should_fail.cold.4+0xa/0x17 [ 909.513163] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 909.517298] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 909.518309] ? __lock_acquire+0x62f/0x4c20 [ 909.518328] ? __lock_acquire+0x62f/0x4c20 [ 909.518345] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 909.518370] ? mark_held_locks+0x130/0x130 [ 909.544057] ? mark_held_locks+0x130/0x130 [ 909.548316] ? __lock_acquire+0x62f/0x4c20 [ 909.552573] ? find_held_lock+0x36/0x1c0 [ 909.556665] ? print_usage_bug+0xc0/0xc0 [ 909.560746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 18:28:05 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) [ 909.566302] ? should_fail+0x22d/0xd01 [ 909.570215] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 909.575343] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 909.580893] should_fail_alloc_page+0x50/0x60 [ 909.585401] __alloc_pages_nodemask+0x322/0xde0 [ 909.590094] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 909.595141] ? find_held_lock+0x36/0x1c0 [ 909.599237] ? ___might_sleep+0x1ed/0x300 [ 909.603399] ? trace_hardirqs_off+0xb8/0x310 [ 909.607825] cache_grow_begin+0x91/0x8c0 [ 909.611901] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 909.617452] ? check_preemption_disabled+0x48/0x280 [ 909.622511] kmem_cache_alloc+0x66a/0x730 [ 909.626679] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 909.632247] io_submit_one+0x1b7/0x1070 [ 909.636250] ? aio_poll+0x14a0/0x14a0 [ 909.640072] ? __might_fault+0x12b/0x1e0 [ 909.640091] ? lock_downgrade+0x900/0x900 [ 909.640108] ? lock_release+0xa00/0xa00 [ 909.640130] ? arch_local_save_flags+0x40/0x40 [ 909.640149] ? blk_lld_busy+0xa0/0xa0 [ 909.648413] __x64_sys_io_submit+0x1bd/0x5c0 [ 909.648434] ? __ia32_sys_io_destroy+0x580/0x580 18:28:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 909.648454] ? trace_hardirqs_on+0xbd/0x310 [ 909.648471] ? __ia32_sys_read+0xb0/0xb0 [ 909.678382] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.683767] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 909.689255] do_syscall_64+0x1b9/0x820 [ 909.693183] ? __ia32_sys_io_destroy+0x580/0x580 [ 909.697944] ? do_syscall_64+0x1b9/0x820 [ 909.697962] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 909.697981] ? syscall_return_slowpath+0x5e0/0x5e0 [ 909.697999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 909.717280] ? trace_hardirqs_on_caller+0x310/0x310 [ 909.722307] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 909.727336] ? prepare_exit_to_usermode+0x291/0x3b0 [ 909.727359] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 909.727384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.727396] RIP: 0033:0x4579b9 [ 909.727413] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 909.764560] RSP: 002b:00007fe2428fec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 909.772293] RAX: ffffffffffffffda RBX: 00007fe2428fec90 RCX: 00000000004579b9 [ 909.779580] RDX: 0000000020000600 RSI: 0000000000001400 RDI: 00007fe2428de000 [ 909.786866] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 909.794142] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2428ff6d4 [ 909.801418] R13: 00000000004beedf R14: 00000000004d0288 R15: 0000000000000005 18:28:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:06 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000000)=0x4, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x11b, 0x4) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[], 0xfd83) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f00000000c0)=0x5, 0x4) recvfrom$inet6(r0, &(0x7f00000001c0)=""/227, 0xe3, 0x2020, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x6d, "e307ce1f4d51e3d7236e17cb47fd2ccc22937cf1c738613da3c7cbe0fbfd3722ace5d7ee8bc026f313322c683d6d739988bd9c004260346ce6be15047e5e3538d9a903bd9d641612ad5b88f8e473cf84eaacb1b530bbe37333fda57b71450300e3f2d395efd0a97007b57227d1"}, &(0x7f0000000180)=0x75) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={r1, 0x9c, "9160a3d8dcb8854127d310b7db6612ecb4a4ced89d97505521a4dab5dc526a06ecb82fa0eb4ed086337057687f9b1106944bb3c68a0dafc1d83525fdbb57b33289d45daa2afea5043a86c8cc664bac8d4a595e21dd98eb989f09a5d6806dee04457764ca458b7177506d1192179e0a28b9d13692fab9991fb340da6659518488af2c0ac602ffbe4c03922ba4940b646dc1966e85f1746536f6db114a"}, &(0x7f0000000380)=0xa4) 18:28:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) r4 = gettid() process_vm_writev(r4, &(0x7f0000000140)=[{&(0x7f0000000080)=""/160, 0xa0}], 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/36, 0x24}], 0x1, 0x0) r5 = syz_open_procfs(r4, &(0x7f0000000240)='cpuset\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000280)={0x1, {{0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000001}}}, 0x88) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, &(0x7f0000000000)={0x0, @dev}) socketpair(0xd, 0x80802, 0xa96f, &(0x7f0000000200)) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0186415, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0xcd5, 0x20000000, 0x0, &(0x7f0000ff7000/0x9000)=nil}) writev(r3, &(0x7f0000000040), 0x146) 18:28:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:06 executing program 4 (fault-call:4 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:06 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae5"], 0xd6) 18:28:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 910.788784] kvm: emulating exchange as write 18:28:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1403, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 911.093082] device bridge_slave_1 left promiscuous mode [ 911.098657] bridge0: port 2(bridge_slave_1) entered disabled state 18:28:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 911.134481] device bridge_slave_0 left promiscuous mode [ 911.140000] bridge0: port 1(bridge_slave_0) entered disabled state 18:28:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1405, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 911.357961] team0 (unregistering): Port device team_slave_1 removed [ 911.384989] team0 (unregistering): Port device team_slave_0 removed [ 911.425320] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 911.447864] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 911.555961] bond0 (unregistering): Released all slaves 18:28:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9d6, 0x0) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000080)={r2, 0x0, 0x2000, 0x10000}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}, 0x0, 0x0, 0x0, 0x0, 0x360}, 0x9c) 18:28:07 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a03"], 0xd8) 18:28:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1404, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 912.208247] IPVS: ftp: loaded support on port[0] = 21 [ 913.248886] chnl_net:caif_netlink_parms(): no params data found [ 913.505453] bridge0: port 1(bridge_slave_0) entered blocking state [ 913.512278] bridge0: port 1(bridge_slave_0) entered disabled state [ 913.519328] device bridge_slave_0 entered promiscuous mode [ 913.552670] bridge0: port 2(bridge_slave_1) entered blocking state [ 913.559115] bridge0: port 2(bridge_slave_1) entered disabled state [ 913.566525] device bridge_slave_1 entered promiscuous mode [ 913.664543] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 913.701861] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 913.800457] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 913.808193] team0: Port device team_slave_0 added [ 913.840263] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 913.848243] team0: Port device team_slave_1 added [ 913.879498] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 913.912980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 914.035343] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 914.069646] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 914.398880] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 915.562364] 8021q: adding VLAN 0 to HW filter on device bond0 [ 915.673598] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 915.785901] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 915.792391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 915.799421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 915.913942] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 915.920176] 8021q: adding VLAN 0 to HW filter on device team0 [ 916.030133] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 916.037304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 916.046907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 916.059952] bridge0: port 1(bridge_slave_0) entered blocking state [ 916.066433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 916.076686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 916.168100] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 916.175345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 916.183681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 916.198101] bridge0: port 2(bridge_slave_1) entered blocking state [ 916.204558] bridge0: port 2(bridge_slave_1) entered forwarding state [ 916.297592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 916.304745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 916.427810] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 916.435105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 916.549793] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 916.556816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 916.567421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 916.577300] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 916.686139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 916.693167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 916.708510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 916.815942] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 916.822867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 916.830589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 916.941311] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 916.948156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 916.957453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 917.499120] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 917.725462] 8021q: adding VLAN 0 to HW filter on device batadv0 18:28:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:14 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) setpriority(0x0, r4, 0x10001) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) fcntl$setflags(r0, 0x2, 0x1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) 18:28:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1407, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:14 executing program 3 (fault-call:6 fault-nth:0): socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) [ 917.881419] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 917.958775] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 917.970391] FAULT_INJECTION: forcing a failure. [ 917.970391] name failslab, interval 1, probability 0, space 0, times 0 [ 918.047874] CPU: 0 PID: 18074 Comm: syz-executor3 Not tainted 4.20.0+ #395 [ 918.054966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 918.064344] Call Trace: [ 918.066961] dump_stack+0x1d3/0x2c6 [ 918.070645] ? dump_stack_print_info.cold.1+0x20/0x20 [ 918.075902] should_fail.cold.4+0xa/0x17 [ 918.080000] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 918.085147] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 918.090457] ? iov_iter_advance+0x306/0x13f0 [ 918.094998] ? fuse_copy_finish+0xf5/0x510 [ 918.099253] ? flush_bg_queue+0x660/0x660 [ 918.103424] ? find_held_lock+0x36/0x1c0 [ 918.107517] ? ___might_sleep+0x1ed/0x300 [ 918.111683] ? memcpy+0x45/0x50 [ 918.114977] ? arch_local_save_flags+0x40/0x40 [ 918.119573] ? fuse_copy_do+0x286/0x440 [ 918.123600] __should_failslab+0x124/0x180 [ 918.127868] should_failslab+0x9/0x14 [ 918.131687] kmem_cache_alloc_trace+0x2db/0x750 [ 918.136372] ? graph_lock+0x270/0x270 [ 918.140194] fuse_dev_do_write+0xd46/0x3820 [ 918.144539] ? fuse_dev_read+0x250/0x250 [ 918.148627] ? mark_held_locks+0x130/0x130 [ 918.148949] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 918.152901] ? mark_held_locks+0x130/0x130 [ 918.152918] ? __lock_acquire+0x62f/0x4c20 [ 918.152932] ? print_usage_bug+0xc0/0xc0 [ 918.152949] ? rcu_read_unlock_special+0x370/0x370 [ 918.152964] ? lock_downgrade+0x900/0x900 [ 918.152978] ? check_preemption_disabled+0x48/0x280 [ 918.153005] ? mark_held_locks+0x130/0x130 [ 918.178640] ? print_usage_bug+0xc0/0xc0 [ 918.187852] ? __lock_acquire+0x62f/0x4c20 [ 918.187868] ? graph_lock+0x270/0x270 [ 918.187884] ? dput.part.25+0x26d/0x790 [ 918.187900] ? graph_lock+0x270/0x270 [ 918.187918] ? graph_lock+0x270/0x270 [ 918.187936] ? find_held_lock+0x36/0x1c0 [ 918.187959] ? aa_file_perm+0x469/0x1060 [ 918.196246] ? lock_downgrade+0x900/0x900 [ 918.196264] ? check_preemption_disabled+0x48/0x280 [ 918.196286] ? kasan_check_read+0x11/0x20 [ 918.196303] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 918.196322] ? rcu_read_unlock_special+0x370/0x370 [ 918.204383] ? aa_file_perm+0x490/0x1060 [ 918.204407] ? aa_path_link+0x5e0/0x5e0 [ 918.204419] ? __fget+0x4d1/0x740 [ 918.204437] ? memset+0x31/0x40 [ 918.204460] fuse_dev_write+0x19a/0x240 [ 918.204477] ? fuse_dev_splice_write+0xe70/0xe70 [ 918.204503] ? proc_fail_nth_write+0x9e/0x210 [ 918.204520] ? proc_cwd_link+0x1d0/0x1d0 [ 918.279810] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 918.285360] ? iov_iter_init+0xe5/0x210 [ 918.289366] __vfs_write+0x72c/0xab0 [ 918.293098] ? kernel_read+0x120/0x120 [ 918.297007] ? wait_for_completion+0x8a0/0x8a0 [ 918.301639] ? apparmor_file_permission+0x24/0x30 [ 918.306520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 918.312088] ? rw_verify_area+0x118/0x360 [ 918.316264] vfs_write+0x1fc/0x580 [ 918.319830] ksys_write+0x101/0x260 [ 918.321014] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 918.323472] ? __ia32_sys_read+0xb0/0xb0 [ 918.323492] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 918.323513] __x64_sys_write+0x73/0xb0 [ 918.323534] do_syscall_64+0x1b9/0x820 18:28:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1408, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 918.323552] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 918.323570] ? syscall_return_slowpath+0x5e0/0x5e0 [ 918.323588] ? trace_hardirqs_on_caller+0x310/0x310 [ 918.364335] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 918.369367] ? recalc_sigpending_tsk+0x180/0x180 [ 918.374157] ? __switch_to_asm+0x40/0x70 [ 918.378228] ? __switch_to_asm+0x34/0x70 [ 918.378253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 918.378278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 918.378291] RIP: 0033:0x4579b9 [ 918.378312] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 918.387224] RSP: 002b:00007f9b17ebbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 918.387239] RAX: ffffffffffffffda RBX: 00007f9b17ebbc90 RCX: 00000000004579b9 [ 918.387246] RDX: 00000000000000d9 RSI: 00000000200002c0 RDI: 0000000000000003 [ 918.387255] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 18:28:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 918.387263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b17ebc6d4 [ 918.387273] R13: 00000000004c65be R14: 00000000004db6a0 R15: 0000000000000004 [ 918.484099] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 918.669964] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000a, 0x4000000031, 0xffffffffffffffff, 0x0) fstat(r4, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000140)=0x54) 18:28:15 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:28:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1402, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 918.910648] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:15 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:15 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='wlan0keyring\x00', 0xffffffffffffffff}, 0x30) getpriority(0x1, r1) ioctl$sock_ifreq(r0, 0x8089a3, &(0x7f00000000c0)={'nEhdevsim5\x00', @ifru_ivalue=0x6}) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) [ 919.027839] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x800000000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x130000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(r0, 0x0, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000080)={0x0, 0x49, 0x4, 0x1}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000240)={0x8001, 0x2}) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000002c0)) tkill(r0, 0x12) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r2, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffffe}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe589}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x40004) 18:28:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:15 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 919.194915] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x8000000000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 919.343842] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 919.436438] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x1092000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:15 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9903002006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 919.744620] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 919.770508] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 919.895049] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x29b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f00000001c0)={0x0, 0x1, [{}]}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000237, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) 18:28:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x740000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:16 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 920.029785] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x7400, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 920.179601] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0f00000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:16 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2080, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f0000000200)={0xcee, 0x4, 0x3ff, 0xfffffffffffffff7, &(0x7f0000000080)=[{}, {}, {}, {}]}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)=0x8001) 18:28:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x4000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 920.656632] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:16 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:28:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0xffffffffff600000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 920.829659] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 920.889360] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:17 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0xc2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x3}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=r1, 0x4) connect(r0, &(0x7f0000000340)=@generic={0x16, "671600bef5ddd92323c359de2a221236caf5bc853dbb3ce8e769d448968eaa1dd0229b7a39ddfd3641e62857bac2e4d0368d0e38ba413e3e9d9b09ac3e3c6094a9ddefa0d29a72415f55c5f22475fa928dacfb43de6a007279911ba7df78c6969a4371ae435f28925344c58ec569dc29a73d933479fd951695ab757c9cd4"}, 0x80) ioctl$RTC_PIE_ON(r0, 0x7005) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid_for_children\x00') sync_file_range(r3, 0x0, 0x8001, 0x0) r4 = dup(r2) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r4, 0x80045530, &(0x7f00000000c0)=""/198) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001800)={0x0, @broadcast, @empty}, &(0x7f0000001840)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000001940)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40082000}, 0xc, &(0x7f0000001900)={&(0x7f0000001880)=@deltclass={0x5c, 0x29, 0x1, 0x70bd2b, 0x25dfdbfe, {0x0, r6, {0x7, 0x1f}, {0x0, 0xfff3}, {0x6, 0x5}}, [@TCA_RATE={0x8, 0x5, {0x572d, 0x100000001}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x28, 0x2, [@TCA_ATM_HDR={0xc, 0x3, "b9a5affe73"}, @TCA_ATM_FD={0x8, 0x1, r4}, @TCA_ATM_FD={0x8, 0x1, r5}, @TCA_ATM_FD={0x8, 0x1, r0}]}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$nl_xfrm(r5, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000007c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b8000000190001010000000000000000e0000002000000000000000000ea0e0502907d309900000000000000001200000000000000000000125f859d0a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000"], 0xb8}}, 0x0) 18:28:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 921.049932] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:17 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d908000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:17 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:17 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffffffffffff8, 0x800) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r2 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000003c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) getresgid(&(0x7f0000000540)=0x0, &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000f00)={0x0}, &(0x7f0000000f40)=0xc) r7 = getuid() getresgid(&(0x7f0000000f80), &(0x7f0000000fc0)=0x0, &(0x7f0000001000)) fcntl$getownex(r1, 0x10, &(0x7f0000001040)={0x0, 0x0}) fstat(r1, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001200)={0x0, r1, 0x0, 0x10, &(0x7f00000011c0)='!mime_type\'eth0\x00'}, 0x30) getresuid(&(0x7f0000001240), &(0x7f0000001280), &(0x7f00000012c0)=0x0) r14 = getegid() r15 = accept$inet(r1, &(0x7f0000001300)={0x2, 0x0, @multicast2}, &(0x7f0000001340)=0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000013c0)={0xffffffffffffffff, r1, 0x0, 0x7, &(0x7f0000001380)='vmnet0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001400)={0x0, 0x0}, &(0x7f0000001440)=0xc) getgroups(0x6, &(0x7f0000001480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff, 0xee01]) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000014c0)=0x0) r20 = geteuid() r21 = getgid() sendmmsg$unix(r0, &(0x7f00000017c0)=[{&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000001c0)="79e3d2bfbcff1befe8b76c47cbc2f4f24b231d2069b8d5ca8b9e34116ec78cce5f92e55e444609803ab468990441be5aa77b94bcdc47b244c183105f5d3cdd7d4c2d197758ee49b7202964a60cc2059e7b7101c72961770ec01d291e661982ed342bd33ebfc8beceacd3e41b55f335808383380d9d15e62078cb0f8708ffb1a7191ad12cacf5dd", 0x87}, {&(0x7f0000000280)="62e73139ad03293c136e8adb4eca164f092268a725f7d924540664d63d783e486a9fadaf407c42dcf6f1c913a3452c1a4b62eca6b231b17dd716e8d8b40f5ae8eea58a93b963ff50edaded8bc3b5b60bfa5aa4eb4811930b6c1298db87d82fd2365d5b253b0e96724aa6eb1bae0f27de13a4ffccb8c338808e48b9c0", 0x7c}, {&(0x7f0000000300)="d67135ade2597087c3c99ad3c077652968221cca2ff8f7cd1eb96e19e97a6fb12d3f77b485d34f1972a42165dc54998b8fb6e32b541af61d208df4", 0x3b}, {&(0x7f0000000340)="d19b7630a2bb96a5c76c4791597d190d67ad4e6835a5fbdc1487956f080b4fc98e0e7e12", 0x24}], 0x4, &(0x7f0000000600)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x38, 0x1, 0x1, [r1, r2, r1, r0, r0, r2, r2, r2, r0]}], 0x58, 0x4}, {&(0x7f0000000680)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000700)}, {&(0x7f0000000740)="b6da5eaa8b7ffaf7f7404240f31180f2a28e62ec3ba12964d87cedc231327fee2ac3d513e6552115327d45fdff86a918df6640d2f970866c764b0c082295b3a33e18ab10542e59012a840fff3c6243ff4398b409dbdbc3ba46b70c8b58d02e7a05d6e279273d443066f345d3b7db2170aaa18b55f0da2cc0b0b213fa49e01058a55ed5ddecf0190cbffa44e3318492bc2ebd834ceb4f1d1eab3f074e589808f51f1a9633f79aee2737a4b6d9c0e11a542c439081ce84579cd92c709a3c5a75ce67f3cb15e11697821ae988f60f6affa78ccb51632962bc8cc6eae82e825a334c95862d43662b0d", 0xe7}, {&(0x7f0000000840)="9ea4b0462d444ae3d587bd17973a", 0xe}, {&(0x7f0000000880)="0892bfc510be589e7cc8", 0xa}, {&(0x7f00000008c0)="55d0f858849d8026b3c56266aa3c271312c96dee36d125d06f04769325e9a452a1ebea779d80fc953e34e63dba0b4cfb3a8684aad33dffe7614905ed8139ecc9486c3cd51cc5dae0bd897b98b706600b7e019bf8d8f1719ee8323e3f9d943ec30b3364fa161b85e585ff308765704fd83cd305deae3eb35142e1ffe67a2ce8c333fa58ff16f7ef3836b903d5aaa4b3518c4d43fea3ff03cd93a0f3312e44bfa5e274dada0ed0fe325e413761", 0xac}, {&(0x7f0000000980)="bb45f112cfc23b50cb816cba4506a2d4710e7d4dd67790f4015e1dd7f76afb0db4a3a7ddc970343c9b1ebc6d0df9ce2a28d45743654790c2e19bfdbcd33f424094e72916a9f379d43bc35ceacd10fa5edf4cfc865bfd26734f42cff8f6b9a374f4786f98b0146aa63b19b8b3e7a5ead4f784e75d7e6a623c4757a6a89c02fc32b1291c3ab99621adb64c5fd77ae7c08609", 0x91}], 0x6}, {&(0x7f0000000ac0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000e80)=[{&(0x7f0000000b40)="35caad91bb1c340617b2fe574bc0428e0a59e4142d4a1e79e0c6f9173ff8f5962c960ab0a95a1216dc8686815582d00565575693b782b3f85700985e0e3f037b95ca9a2d50e1ca580303a5ded69c4d7f60e7fe466547aace0cf1ff055cefff32aa3d4b030840bb5e9fa721f8ae8ac4c9abe3abfb6c0dc1ab1f32628423227896b688e9996034fbc3e78308ccafe88a0f4e02f06a58a208595c17edd567dba59cfe5086e1fb3231b36d2d6977399d02d78b0ece017f53deb9516897370bbd96c3b573f4db430de5d90d51268edd0165a81a131132076a1bdc4a61779ae16d16dfd89eafd2ce85ea0ec80f4eecbfc7c0ebffc366", 0xf3}, {&(0x7f0000000c40)="e794927ffa2c9ad18be3456648e5cb0804e77bad566155ac5d5f91b5f160571d83", 0x21}, {&(0x7f0000000c80)="c51020b8ae785f2f295318a3dd446285199a022a6f9216292b48e48f98cd222981c008da2da442643fb7ddbd70353243cae0cb4a1520416faa58b7cb79815e", 0x3f}, {&(0x7f0000000cc0)="df71952571d285e779a48647634ab40a38c0e9164d3023d00339c720cfee805dcbb46973", 0x24}, {&(0x7f0000000d00)="eedc6bf43cd708f5957f7c228e8ea5c020536309a5689bd5951af2e72e0e51cf840b4cd3369e1bbcd04941b5b46dfd82e4233393", 0x34}, {&(0x7f0000000d40)="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", 0xff}, {&(0x7f0000000e40)="bf497460f2b8008a25de91333cc5f798392d1517a8bed746", 0x18}], 0x7, &(0x7f0000001500)=[@rights={0x18, 0x1, 0x1, [r2]}, @rights={0x18, 0x1, 0x1, [r2, r0]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x30, 0x1, 0x1, [r2, r2, r0, r1, r2, r1, r2, r15]}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @cred={0x20, 0x1, 0x2, r19, r20, r21}], 0x100, 0x4010}, {&(0x7f0000001600)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001780)=[{&(0x7f0000001680)="4da3a01e76ddadb4b2516bbcc00e522a78ebbb7eef575d963890994688a87302a89aefd96ba751cd53a62f6cf0e8699333dc4c2ece31da9fae1095e2c54069e92a3fdec1d89c8343b81618976738cdddc298ce388c70508e149dea7328157cb33a9b0a73cf330b596ded4a92c4148da33d8a6cceab38d43ed05e0d201295c498cd7a2b8db8c84411fc8886e08d5dd0feee4757455eedaf0367b20270cdcc046f0a88b2d007f2e667628920952a0743655a4bad75fc4729a3c096ef1c162369ada10377", 0xc3}], 0x1, 0x0, 0x0, 0x4}], 0x4, 0x24008840) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000080)=0x9) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r22 = socket(0x10, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x38, &(0x7f0000caaffb), &(0x7f0000000000)=0xc) 18:28:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 921.591844] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) socket(0xe, 0x1, 0x200000000000041) syz_emit_ethernet(0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)={0x1, 0x2, [0x461, 0x0, 0x525, 0x8de]}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x20002000, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) clone(0x1ffff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) setsockopt$packet_rx_ring(r2, 0x107, 0xf, &(0x7f0000000080)=@req3={0x0, 0x3, 0x5000000}, 0x1c) ptrace(0x4208, r3) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='gid_map\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000300)='projid_map\x00') ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000080)={0x6, 0xffff, 0x0, 0xffff, 0xfff}) sendfile(r5, r4, &(0x7f0000000040), 0x10001) read(r5, &(0x7f0000000100)=""/252, 0xfc) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000400)) ioctl$TCFLSH(r1, 0x540b, 0x1) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r6 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) connect$unix(r6, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$bt_BT_CHANNEL_POLICY(r6, 0x112, 0xa, &(0x7f00000003c0)=0x6, 0x4) 18:28:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x400000000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:17 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 921.815364] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 921.927603] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 922.039392] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:18 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d910000006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x700, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:18 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) socket(0xe, 0x1, 0x200000000000041) syz_emit_ethernet(0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)={0x1, 0x2, [0x461, 0x0, 0x525, 0x8de]}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x20002000, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) clone(0x1ffff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) setsockopt$packet_rx_ring(r2, 0x107, 0xf, &(0x7f0000000080)=@req3={0x0, 0x3, 0x5000000}, 0x1c) ptrace(0x4208, r3) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='gid_map\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000300)='projid_map\x00') ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000080)={0x6, 0xffff, 0x0, 0xffff, 0xfff}) sendfile(r5, r4, &(0x7f0000000040), 0x10001) read(r5, &(0x7f0000000100)=""/252, 0xfc) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000400)) ioctl$TCFLSH(r1, 0x540b, 0x1) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r6 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) connect$unix(r6, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$bt_BT_CHANNEL_POLICY(r6, 0x112, 0xa, &(0x7f00000003c0)=0x6, 0x4) [ 922.592722] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:18 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x20090100000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) socket(0xe, 0x1, 0x200000000000041) syz_emit_ethernet(0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)={0x1, 0x2, [0x461, 0x0, 0x525, 0x8de]}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x20002000, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) clone(0x1ffff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) setsockopt$packet_rx_ring(r2, 0x107, 0xf, &(0x7f0000000080)=@req3={0x0, 0x3, 0x5000000}, 0x1c) ptrace(0x4208, r3) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='gid_map\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000300)='projid_map\x00') ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000080)={0x6, 0xffff, 0x0, 0xffff, 0xfff}) sendfile(r5, r4, &(0x7f0000000040), 0x10001) read(r5, &(0x7f0000000100)=""/252, 0xfc) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000400)) ioctl$TCFLSH(r1, 0x540b, 0x1) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r6 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) connect$unix(r6, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$bt_BT_CHANNEL_POLICY(r6, 0x112, 0xa, &(0x7f00000003c0)=0x6, 0x4) [ 922.804866] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 923.010355] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:19 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000005000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0xffefffffff7f0000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) socket(0xe, 0x1, 0x200000000000041) syz_emit_ethernet(0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)={0x1, 0x2, [0x461, 0x0, 0x525, 0x8de]}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x20002000, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) clone(0x1ffff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) setsockopt$packet_rx_ring(r2, 0x107, 0xf, &(0x7f0000000080)=@req3={0x0, 0x3, 0x5000000}, 0x1c) ptrace(0x4208, r3) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='gid_map\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000300)='projid_map\x00') ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000080)={0x6, 0xffff, 0x0, 0xffff, 0xfff}) sendfile(r5, r4, &(0x7f0000000040), 0x10001) read(r5, &(0x7f0000000100)=""/252, 0xfc) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000400)) ioctl$TCFLSH(r1, 0x540b, 0x1) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r6 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) connect$unix(r6, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$bt_BT_CHANNEL_POLICY(r6, 0x112, 0xa, &(0x7f00000003c0)=0x6, 0x4) [ 923.527379] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x9400, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 923.749028] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x80700000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:20 executing program 0: ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r0, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}], 0x2, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[], 0xfffffe52) 18:28:20 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000001000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:28:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x10710000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x200901, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 924.762413] device bridge_slave_1 left promiscuous mode [ 924.768192] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.845923] device bridge_slave_0 left promiscuous mode [ 924.884083] bridge0: port 1(bridge_slave_0) entered disabled state 18:28:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x100000000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:21 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'lo\x00'}) 18:28:21 executing program 0: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e20, 0x2, @mcast2, 0x91}, {0xa, 0x4e22, 0x10000, @empty, 0x28dd}, 0x7, [0x5, 0x7f, 0xffff, 0x7fff, 0x2f03, 0x1, 0x1, 0x1]}, 0x5c) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)="96", 0x1}], 0x1, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0xfffffffffffffeaf) write$nbd(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x51) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x400, 0x8}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e20, 0x8}}, 0x5, 0x7f}, 0x90) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xff, 0x0) [ 925.185940] team0 (unregistering): Port device team_slave_1 removed [ 925.217483] team0 (unregistering): Port device team_slave_0 removed 18:28:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x300000000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L+'}, 0x28, 0x1) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200403, 0x0) connect$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, {0x100000000, 0x9, 0x65, 0x32, 0x10001, 0x1af}, 0x3ff}, 0xa) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x1d, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 925.247667] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 925.265633] bond0 (unregistering): Releasing backup interface bond_slave_0 18:28:21 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000002000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) [ 925.442531] bond0 (unregistering): Released all slaves [ 925.989871] IPVS: ftp: loaded support on port[0] = 21 [ 926.972180] chnl_net:caif_netlink_parms(): no params data found [ 927.285409] bridge0: port 1(bridge_slave_0) entered blocking state [ 927.292178] bridge0: port 1(bridge_slave_0) entered disabled state [ 927.299274] device bridge_slave_0 entered promiscuous mode [ 927.336251] bridge0: port 2(bridge_slave_1) entered blocking state [ 927.342952] bridge0: port 2(bridge_slave_1) entered disabled state [ 927.350058] device bridge_slave_1 entered promiscuous mode [ 927.449610] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 927.488206] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 927.585798] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 927.594708] team0: Port device team_slave_0 added [ 927.625875] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 927.633666] team0: Port device team_slave_1 added [ 927.663685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 927.699381] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 927.826490] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 927.862240] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 928.184257] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 929.360780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 929.477755] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 929.592893] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 929.599092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 929.607040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 929.715426] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 929.722922] 8021q: adding VLAN 0 to HW filter on device team0 [ 929.830408] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 929.837708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 929.845880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 929.853861] bridge0: port 1(bridge_slave_0) entered blocking state [ 929.860231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 929.868318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 929.968350] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 929.975546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 929.987722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 929.995994] bridge0: port 2(bridge_slave_1) entered blocking state [ 930.002429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 930.106441] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 930.113537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 930.235048] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 930.242289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 930.355563] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 930.362821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 930.370956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 930.379041] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 930.485802] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 930.493055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 930.501827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 930.612993] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 930.619827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 930.628350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 930.737388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 930.744472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 930.752731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 931.308432] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 931.532684] 8021q: adding VLAN 0 to HW filter on device batadv0 18:28:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x60ff, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:27 executing program 0: socket$inet6(0xa, 0x805, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000100)=0xffffffff80000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000500)={0x6c07, 0x0, 0x3ff, 0x8000000005, 0x5}) futex(&(0x7f0000000800)=0x1, 0x1, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f0000000780)=0x2, 0x8) flistxattr(r0, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.impure\x00') epoll_wait(r0, &(0x7f0000000180)=[{}, {}, {}], 0x3, 0xd) unshare(0x40000000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = semget$private(0x0, 0x8, 0x4) semctl$SEM_STAT(r2, 0x2, 0x12, &(0x7f00000008c0)=""/208) semctl$GETPID(0x0, 0x0, 0xb, 0x0) unshare(0x4000000) gettid() ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000240)={[0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0xfffffffffffffffd]}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f00000005c0)=""/94, &(0x7f00000001c0)=0x5e) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2000000000010000, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1002}}, 0x20) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000040)}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000740)={0xb, 0xd9, 0xfa00, {&(0x7f0000000640), r4, 0x9}}, 0x18) ioctl$UI_DEV_SETUP(r1, 0x405c5503, 0xffffffffffffffff) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getdents64(r5, &(0x7f00000000c0)=""/11, 0xeb) 18:28:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:27 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000003000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) [ 931.683932] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 931.760951] QAT: Invalid ioctl [ 931.775370] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 931.780791] QAT: Invalid ioctl 18:28:28 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x7000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 931.889869] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 932.026208] IPVS: ftp: loaded support on port[0] = 21 18:28:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x2000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 932.105519] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:28 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 932.352672] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 932.903601] QAT: Invalid ioctl [ 932.907023] QAT: Invalid ioctl [ 933.002737] IPVS: ftp: loaded support on port[0] = 21 18:28:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000001c0), &(0x7f00000003c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = userfaultfd(0x800) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000f6bfe8)) ppoll(&(0x7f0000000200)=[{r3}], 0x1, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280), 0x8) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x402980, 0x0) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000005c0)={0x0, 0x100}, 0x8) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f00000002c0)=""/233) ppoll(&(0x7f0000000400)=[{r0, 0x8020}, {r2, 0x10}, {r2, 0x2}, {r4}, {r1}], 0x5, &(0x7f0000000440), &(0x7f0000000480)={0x2}, 0x8) ioctl$IOC_PR_REGISTER(r4, 0x401870c8, &(0x7f0000000140)={0xffff, 0x8b}) open(&(0x7f0000000580)='./file0\x00', 0x200280, 0x8) ioctl$VIDIOC_S_DV_TIMINGS(r4, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f00000004c0)={0x0, 0x1e, "552a7298f6a14286fce1de777f1831af3936bc4ce06d178a26f8a1563994"}, &(0x7f0000000500)=0x26) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000540)={0x0, 0xffffffffffff30d0, 0x4, 0x40, 0xffffffffffffffff, 0xc8, 0x4, 0x1, r5}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000004840)={'vcan0\x00'}) clock_gettime(0x0, &(0x7f00000048c0)) 18:28:31 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x107100, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:31 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000004000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 935.130742] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:31 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x90500000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x10, 0x20000000000003, 0x0) clock_gettime(0x0, &(0x7f0000000580)={0x0}) recvmmsg(r1, &(0x7f0000001cc0), 0x4000000000002c0, 0x10102, &(0x7f0000001540)={r2}) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000003080)=ANY=[@ANYBLOB="aa5d1c0fbb8bd84c000200000000000000000000"], 0xff8b}}, 0x0) [ 935.310680] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:31 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x8000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 935.507089] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:31 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x740000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 935.717116] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:32 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900080006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:32 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 935.963802] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x7fe2428de000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:32 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:28:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0x4000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 18:28:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 936.324428] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000240)={0x200000000001, 0x0, {0x0, 0x0, 0x0, 0xc, 0x0, 0x800}}) 18:28:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:32 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 936.484433] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x400000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:33 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x3) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f0000000180)="abbaf7ec78211cc1bc7f4946816d602c8f9da10f83c4b5262abb8300b0fdb0dac59f7e11855dc479bde7cb04f41c95813dc94491e9bd80c89705890c1c0f00fb0bb7", 0x42, 0x8000, &(0x7f0000000100)={0xa, 0x2000000004e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000180), 0x0) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r1, &(0x7f0000000380)="7834b3f6dee05d71031d18c8c8ced61adc47688588a2e6e9e0f85e9e6dbe4a2ae1e765a60538fc9af3b347a3dfd28f76ed523a651f1bbc5abb95406de55d753c30f5", 0x42, 0x0, &(0x7f0000000480)={0xa, 0x0, 0x0, @dev}, 0x1c) 18:28:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:33 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900100006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:33 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 937.014975] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x500000000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 937.123777] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:33 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x60ffffffffff, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 937.379443] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0xe86) syz_execute_func(&(0x7f0000000040)="c443057d5e12b8c442c50b6000410fae6f0666412228c4217a127e03c4e17a2d5d9426660fec06c4c2adab6900652645fd47d9e9") modify_ldt$read(0x0, &(0x7f0000000100)=""/31, 0x1f) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x35, &(0x7f0000000140)=0x1, 0x4) rt_sigreturn() 18:28:33 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 937.600372] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:34 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000003000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:34 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000680)='/dev/video37\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$xdp(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x2c, 0x1, r3, 0x27}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000240)="47fc0d05ed2d72abfadfc5d459d3479de776d220c2b2085cd5bdafc95d2c", 0x1e}, {&(0x7f0000000280)="0fda4a77f52e95e8fa5c0fd4b0148cfa432b0d21542716", 0x17}], 0x2, 0x0, 0x0, 0x4000040}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x440800, 0x43) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', r2}, 0x10) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000080)={0x3, 0x990001}) r5 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0xffffffffffffffec) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000040), &(0x7f00000000c0)=0x4) dup3(r4, r0, 0x0) mlockall(0x2) 18:28:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x400b0100000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 937.924102] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:34 executing program 0: fanotify_mark(0xffffffffffffffff, 0x80, 0x8000004, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x111002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0xd, r1, 0x1, 0x59b8, 0x6, @dev={[], 0xd}}, 0x14) 18:28:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x1000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:34 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x4, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)="6cd561ba8072ab0e59a24d94993d8ea6f6ef21c7c0e04e34e1c5730f976afb304288497ca59ad4f501ddd759240f9dbe8a7329949c2cd7c6b88357ae7441e6838df0053ddb7f4d7305e84e2e032183b7d66b5e68e5252dbb5ada88421cbdf464ab4720363578167ab0de46494b49026babff69352b79b39ce779c7c5c15224a9fb8269f25914d76edf81c78f50e7d1528eecdae1d85e8d8696b308b5ebfd0524aaef5a594b6d68f232f49e87c53f1f71b8a4ac25830ff1bfc50c50e00a1eb36731ea7a97a3a6", &(0x7f0000000200)="193721ac086eaec84aca0b6d2b9f4ce5b8e3d43361bdec64938ef6036e6663a4ed23cfecbef4760268d8fcf7a728d09ef0dc2346a0057feca564177d0a52afa9c3c0dd3ca052794b79bb47c9168be4afe48e251d09efdd996076222dab1df49fd2ae931544bfb7c513c724886bb81cf20ee3c48696ba989d4f488267e4c9bf3d8ba31a607d9ebc403cb96269ab006583e033c52431b66cb1327b3219f9b228fe85e8aa9644d4518b15c85599aa", 0x2}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040), 0x4) 18:28:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 938.164140] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 938.258151] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:28:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') unshare(0x2000400) preadv(r0, 0x0, 0x0, 0x0) 18:28:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:34 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000005000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 938.828842] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:35 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="017ac2000000aaaaaaaaaabb86dd60093a0600083a00fe8000000000000000000000000000bbff02000000000000000000000000000100009078"], 0x0) 18:28:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x711000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000540)='\b', 0x1, 0x3fffffa, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) [ 938.995446] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x400000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 939.302024] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:35 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000806000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000008c0)) 18:28:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x3000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x4000000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 939.765321] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x100000fe}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 18:28:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x4000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 939.909913] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 940.031727] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:36 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900001006000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xeffdffff00000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:36 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000002940)=[{{&(0x7f0000000bc0)=@tipc=@id, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000c40)=""/2, 0x2}, {&(0x7f0000000c80)=""/99, 0x63}, {&(0x7f0000000d00)=""/23, 0x17}, {&(0x7f0000000d40)=""/217, 0xd9}, {&(0x7f0000000e40)=""/10, 0xa}], 0x5, &(0x7f0000000f00)=""/204, 0xcc}, 0x5e8000}, {{&(0x7f0000001000)=@tipc, 0x80, &(0x7f0000001300)=[{&(0x7f0000001080)=""/162, 0xa2}, {&(0x7f0000001140)=""/11, 0xb}, {&(0x7f0000001180)=""/104, 0x68}, {&(0x7f0000001200)=""/246, 0xf6}], 0x4, &(0x7f0000001340)=""/230, 0xe6}, 0x6}, {{&(0x7f0000001440)=@x25, 0x80, &(0x7f0000001880)=[{&(0x7f00000014c0)=""/230, 0xe6}, {&(0x7f00000015c0)=""/43, 0x2b}, {&(0x7f0000001600)=""/65, 0x41}, {&(0x7f0000001680)=""/36, 0x24}, {&(0x7f00000016c0)=""/148, 0x94}, {&(0x7f0000001780)=""/253, 0xfd}], 0x6, &(0x7f0000001900)=""/226, 0xe2}, 0x20}, {{&(0x7f0000001a00)=@xdp, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001a80)=""/130, 0x82}, {&(0x7f0000001b40)=""/2, 0x2}], 0x2}, 0x8}, {{0x0, 0x0, &(0x7f0000002600)=[{&(0x7f0000002400)=""/102, 0x66}, {&(0x7f0000002480)=""/135, 0x87}], 0x2}}], 0x5, 0x40, &(0x7f0000002b00)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 18:28:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x807000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:36 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000002940)=[{{&(0x7f0000000bc0)=@tipc=@id, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000c40)=""/2, 0x2}, {&(0x7f0000000c80)=""/99, 0x63}, {&(0x7f0000000d00)=""/23, 0x17}, {&(0x7f0000000d40)=""/217, 0xd9}, {&(0x7f0000000e40)=""/10, 0xa}], 0x5, &(0x7f0000000f00)=""/204, 0xcc}}, {{&(0x7f0000001000)=@tipc, 0x80, &(0x7f0000001300)=[{&(0x7f0000001080)=""/162, 0xa2}, {&(0x7f0000001140)=""/11, 0xb}, {&(0x7f0000001180)=""/104, 0x68}, {&(0x7f0000001200)=""/246, 0xf6}], 0x4, &(0x7f0000001340)=""/230, 0xe6}, 0x6}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001a80)=""/130, 0x82}, {&(0x7f0000001b40)=""/2, 0x2}], 0x2}}, {{0x0, 0x0, &(0x7f0000002600)=[{&(0x7f0000002400)=""/102, 0x66}, {&(0x7f0000002480)=""/135, 0x87}], 0x2}}], 0x4, 0x40, &(0x7f0000002b00)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 18:28:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 940.741559] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000240)={'filter\x00', 0x2, [{}, {}]}, 0x48) 18:28:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) [ 940.915590] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:37 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000005000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x509000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:37 executing program 0: timerfd_create(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x100, 0x100000000, 0x804, 0x2, 0x0, &(0x7f0000000080)='teql0\x00', 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) fchown(0xffffffffffffffff, r0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000440), 0x4) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') getdents64(r3, &(0x7f0000000340)=""/57, 0x252) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x100bb, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000180)='.\x00', 0x2, 0x0) 18:28:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xffc99a3b00000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 941.666821] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:37 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000002000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x7, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 941.813344] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:38 executing program 0: timerfd_create(0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x100, 0x100000000, 0x804, 0x2, 0x0, &(0x7f0000000080)='teql0\x00', 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) fchown(0xffffffffffffffff, r0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000440), 0x4) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') getdents64(r3, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x100bb, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000180)='.\x00', 0x2, 0x0) 18:28:38 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:28:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x8dffffff00000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 941.970357] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x940000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:38 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:38 executing program 0: getpeername(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x7, 0x4) stat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x4ed4, &(0x7f0000000100)=0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0xbb1) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 942.196271] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x708000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:38 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000003000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:38 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xf0ffffff}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x10b4000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:38 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) umount2(0x0, 0x0) mount(&(0x7f0000000240), &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x1, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00') [ 942.741447] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:38 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x101002) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)) 18:28:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0xff600000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:39 executing program 0: clock_gettime(0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/97, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000380)=""/181, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000280)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000580)=0x104000000) 18:28:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x5efff7f}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:39 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000004000000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:28:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x5000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:39 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000040)=0x5, 0x4) 18:28:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x400b01, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000300)="80fd02", 0x3}], 0x1, 0x0) [ 943.962469] device bridge_slave_1 left promiscuous mode [ 943.969497] bridge0: port 2(bridge_slave_1) entered disabled state 18:28:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) [ 944.004446] device bridge_slave_0 left promiscuous mode [ 944.020350] bridge0: port 1(bridge_slave_0) entered disabled state 18:28:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x5, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x17b}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0xe08d42e27f0000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 944.254726] team0 (unregistering): Port device team_slave_1 removed [ 944.270688] team0 (unregistering): Port device team_slave_0 removed [ 944.296698] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 944.314861] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 944.416218] bond0 (unregistering): Released all slaves 18:28:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 944.989847] IPVS: ftp: loaded support on port[0] = 21 [ 946.285362] chnl_net:caif_netlink_parms(): no params data found [ 946.592969] bridge0: port 1(bridge_slave_0) entered blocking state [ 946.599486] bridge0: port 1(bridge_slave_0) entered disabled state [ 946.609875] device bridge_slave_0 entered promiscuous mode [ 946.640587] bridge0: port 2(bridge_slave_1) entered blocking state [ 946.647442] bridge0: port 2(bridge_slave_1) entered disabled state [ 946.655193] device bridge_slave_1 entered promiscuous mode [ 946.747725] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 946.783493] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 946.874440] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 946.882325] team0: Port device team_slave_0 added [ 946.911783] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 946.918944] team0: Port device team_slave_1 added [ 946.949899] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 946.980827] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 947.097712] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 947.130587] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 947.429154] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 948.524480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 948.629695] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 948.736394] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 948.742884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 948.750478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 948.851582] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 948.857708] 8021q: adding VLAN 0 to HW filter on device team0 [ 948.960128] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 948.967462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 948.975826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 948.983989] bridge0: port 1(bridge_slave_0) entered blocking state [ 948.990370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 948.997842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 949.094132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 949.101289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 949.109276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 949.117362] bridge0: port 2(bridge_slave_1) entered blocking state [ 949.123778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 949.230733] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 949.237880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 949.353917] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 949.360795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 949.478865] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 949.494706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 949.502872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 949.510693] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 949.602995] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 949.609880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 949.619697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 949.724363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 949.731243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 949.738941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 949.842544] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 949.849446] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 949.859594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 950.407250] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 950.634575] 8021q: adding VLAN 0 to HW filter on device batadv0 18:28:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x80802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x12, 0x420, [0x0, 0x200002c0, 0x200004d0, 0x20000610], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]}, 0x498) 18:28:46 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006100000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xffffffff00000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:46 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 950.780668] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 950.837215] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 950.860264] kernel msg: ebtables bug: please report to author: Total nentries is wrong 18:28:47 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xf0d741) sched_setattr(0x0, &(0x7f0000000100)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) open$dir(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) [ 950.883755] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:28:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 950.909580] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x905000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 951.030907] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 951.106309] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x940000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 951.203936] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 951.354447] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:47 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000800000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x200000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x3, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 951.715175] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 951.734842] Unknown ioctl 1075883590 [ 951.749591] Unknown ioctl 1075883590 [ 951.760142] Unknown ioctl 1075883590 18:28:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 951.772437] Unknown ioctl 1075883590 [ 951.776364] Unknown ioctl 1075883590 [ 951.780322] Unknown ioctl 1075883590 18:28:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x700000000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 951.821002] Unknown ioctl 1075883590 [ 951.837981] Unknown ioctl 1075883590 18:28:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) [ 951.876510] Unknown ioctl 1075883590 [ 951.883223] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 951.899529] Unknown ioctl 1075883590 [ 951.921607] Unknown ioctl 1075883590 18:28:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xf0ffffff7f0000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 951.925522] Unknown ioctl 1075883590 [ 951.933548] Unknown ioctl 1075883590 [ 951.948431] Unknown ioctl 1075883590 [ 951.965316] Unknown ioctl 1075883590 [ 951.980771] Unknown ioctl 1075883590 18:28:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x500, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 952.004891] Unknown ioctl 1075883590 [ 952.008695] Unknown ioctl 1075883590 [ 952.029078] Unknown ioctl 1075883590 [ 952.041846] Unknown ioctl 1075883590 [ 952.045625] Unknown ioctl 1075883590 [ 952.049357] Unknown ioctl 1075883590 [ 952.061676] Unknown ioctl 1075883590 [ 952.065488] Unknown ioctl 1075883590 [ 952.069214] Unknown ioctl 1075883590 [ 952.079113] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 952.143886] Unknown ioctl 1075883590 [ 952.171313] Unknown ioctl 1075883590 [ 952.175130] Unknown ioctl 1075883590 [ 952.178877] Unknown ioctl 1075883590 [ 952.188516] Unknown ioctl 1075883590 [ 952.195124] Unknown ioctl 1075883590 [ 952.216013] Unknown ioctl 1075883590 [ 952.225414] Unknown ioctl 1075883590 [ 952.240267] Unknown ioctl 1075883590 [ 952.245886] Unknown ioctl 1075883590 18:28:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x7fffffffefff, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:48 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000001000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x4000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:48 executing program 0: creat(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x0, 0x0) 18:28:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 952.723551] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) faccessat(r1, 0x0, 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, 0x0, 0xc4041, 0x0) write$binfmt_misc(r1, 0x0, 0x0) 18:28:49 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x200000000000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 952.838073] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 952.851744] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 18:28:49 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 952.996241] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x4, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 953.227420] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:49 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000080000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:49 executing program 0: timer_create(0x0, 0x0, &(0x7f00009b1ffc)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0x4, 0x1}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 18:28:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x1000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:49 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x100000000000000, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 953.668756] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x80700000000000, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:50 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) 18:28:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 953.788995] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x7b010000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 953.990515] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:50 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000100000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x9400, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:50 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x2000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:50 executing program 0: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 18:28:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 954.611861] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:50 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x509000, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) [ 954.744480] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) 18:28:51 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 954.864859] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:51 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006080000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0xe08d42e27f0000, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x10}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 18:28:51 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 18:28:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) [ 955.512976] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:51 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000800000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:51 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x8000000, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 955.783406] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x100000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:52 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:28:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x905000, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:52 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(r0, 0x4, 0x9) mount(0x0, &(0x7f0000000680)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000003c0)) chdir(&(0x7f0000000000)='./file0\x00') r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) [ 955.920552] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x740000, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:52 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 956.108725] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:52 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006001000000000000000000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:52 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 18:28:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x4000, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, 0x0, 0xfffffffffffffe2e) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) pipe(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4008000, 0x0, 0x0) recvmsg(r0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 18:28:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xfffffdef}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:52 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) [ 956.652851] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x107100, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:52 executing program 0: 18:28:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:53 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) [ 956.919431] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:53 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000008000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:53 executing program 0: 18:28:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x5efff7f00000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0xff600000, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:53 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:53 executing program 0: [ 957.571412] kernel msg: ebtables bug: please report to author: Valid hook without chain 18:28:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:53 executing program 0: 18:28:53 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 18:28:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x1000000, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:54 executing program 0: 18:28:54 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="d900000006000000000000000010000001000000000000000000000000000000b000000000000000e2ab4926e1b7590a7407c1d4db1f5291de4bf1b1e4736e2adc13950939f4703a1b09b1c099495b7b0cbc203bafc41730f4aef97f63ae235ce00100010000000000c97a6b763471a9a91e8a504b01878b5a0768f418626ef5201c2e0c8e06a80db50be6293c994ec463ec3d2378b05afcf6a9b5df56bd8b786ffd601457caa1fe42e0db1c8dc783742dbd2e801b7b607c1a68e4d9fffde09013d6265a751e2c9366be621c8e64230d71d95cff8ae52a0300"], 0xd9) 18:28:54 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 18:28:54 executing program 0: 18:28:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xf0ffffff00000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") 18:28:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x60ff, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x90, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=[{}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x108) 18:28:54 executing program 0: 18:28:54 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = dup2(r0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 18:28:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000240)=0x0) socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x3, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x7}]) 18:28:54 executing program 0: 18:28:54 executing program 0: 18:28:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x40000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c1f023c12629d719070") [ 958.847294] device bridge_slave_1 left promiscuous mode [ 958.855728] bridge0: port 2(bridge_slave_1) entered disabled state [ 958.891716] device bridge_slave_0 left promiscuous mode [ 958.938127] bridge0: port 1(bridge_slave_0) entered disabled state [ 959.077310] team0 (unregistering): Port device team_slave_1 removed [ 959.088919] team0 (unregistering): Port device team_slave_0 removed [ 959.101508] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 959.116089] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 959.169703] bond0 (unregistering): Released all slaves [ 959.258201] WARNING: CPU: 1 PID: 33 at net/batman-adv/multicast.c:371 batadv_mcast_mla_update+0x248f/0x2da0 [ 959.268637] Kernel panic - not syncing: panic_on_warn set ... [ 959.274541] CPU: 1 PID: 33 Comm: kworker/u4:2 Not tainted 4.20.0+ #395 [ 959.281202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.290565] Workqueue: bat_events batadv_mcast_mla_update [ 959.296122] Call Trace: [ 959.298739] dump_stack+0x1d3/0x2c6 [ 959.299671] kobject: 'loop5' (000000007a72aeaf): kobject_uevent_env [ 959.302379] ? dump_stack_print_info.cold.1+0x20/0x20 [ 959.302454] panic+0x2ad/0x55f [ 959.302471] ? add_taint.cold.5+0x16/0x16 [ 959.308894] kobject: 'loop5' (000000007a72aeaf): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 959.314074] ? __warn.cold.8+0x5/0x52 [ 959.314088] ? __warn+0xe8/0x1d0 [ 959.314105] ? batadv_mcast_mla_update+0x248f/0x2da0 [ 959.314135] __warn.cold.8+0x20/0x52 [ 959.314152] ? rcu_softirq_qs+0x20/0x20 [ 959.350827] ? batadv_mcast_mla_update+0x248f/0x2da0 [ 959.355949] report_bug+0x254/0x2d0 [ 959.359650] do_error_trap+0x11b/0x200 [ 959.363551] do_invalid_op+0x36/0x40 [ 959.367284] ? batadv_mcast_mla_update+0x248f/0x2da0 [ 959.372396] invalid_op+0x14/0x20 [ 959.375865] RIP: 0010:batadv_mcast_mla_update+0x248f/0x2da0 [ 959.381607] Code: 49 c1 ee 03 48 b8 00 00 00 00 00 fc ff df be f8 f8 ff ff 66 41 89 34 06 48 c1 ea 03 c6 04 02 f8 e9 f7 e7 ff ff e8 01 52 be f9 <0f> 0b e9 b8 e3 ff ff 48 8b bd 48 fc ff ff e8 fe 35 02 fa e9 99 df [ 959.400558] RSP: 0018:ffff8880a967f338 EFLAGS: 00010293 [ 959.405931] RAX: ffff8880a966e140 RBX: 0000000000000001 RCX: ffffffff87c34865 [ 959.413225] RDX: 0000000000000000 RSI: ffffffff87c364af RDI: 0000000000000007 [ 959.420501] RBP: ffff8880a967f738 R08: ffff8880a966e140 R09: 0000000000000006 [ 959.427785] R10: 0000000000000000 R11: ffff8880a966e140 R12: ffff8880a967f490 [ 959.435058] R13: 0000000000000000 R14: 1ffff110152cfe92 R15: ffff8880a967f710 [ 959.442349] ? batadv_mcast_mla_update+0x845/0x2da0 [ 959.447376] ? batadv_mcast_mla_update+0x248f/0x2da0 [ 959.452518] ? batadv_mcast_mla_update+0x248f/0x2da0 [ 959.457629] ? print_usage_bug+0xc0/0xc0 [ 959.461729] ? batadv_mcast_querier_log.isra.17+0x1f0/0x1f0 [ 959.467450] ? kasan_check_read+0x11/0x20 [ 959.471605] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 959.476912] ? check_preemption_disabled+0x48/0x280 [ 959.481958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 959.487501] ? graph_lock+0x270/0x270 [ 959.491314] ? __lock_is_held+0xb5/0x140 [ 959.495415] ? debug_object_deactivate+0x2eb/0x450 [ 959.500351] ? lock_downgrade+0x900/0x900 [ 959.504541] ? find_held_lock+0x36/0x1c0 [ 959.508610] ? graph_lock+0x270/0x270 [ 959.512445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 959.518006] ? check_preemption_disabled+0x48/0x280 [ 959.523048] ? __lock_is_held+0xb5/0x140 [ 959.527134] process_one_work+0xc90/0x1c40 [ 959.531388] ? mark_held_locks+0x130/0x130 [ 959.535652] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 959.537150] IPVS: ftp: loaded support on port[0] = 21 [ 959.540333] ? preempt_notifier_register+0x200/0x200 [ 959.550135] kobject: 'lo' (00000000614ca62a): kobject_add_internal: parent: 'net', set: 'devices' [ 959.550666] ? __switch_to_asm+0x34/0x70 [ 959.562277] kobject: 'lo' (00000000614ca62a): kobject_uevent_env [ 959.563734] ? __switch_to_asm+0x34/0x70 [ 959.569888] kobject: 'lo' (00000000614ca62a): fill_kobj_path: path = '/devices/virtual/net/lo' [ 959.573924] ? __switch_to_asm+0x40/0x70 [ 959.573937] ? __switch_to_asm+0x34/0x70 [ 959.573949] ? __switch_to_asm+0x40/0x70 [ 959.573960] ? __switch_to_asm+0x34/0x70 [ 959.573974] ? __switch_to_asm+0x34/0x70 [ 959.573988] ? __switch_to_asm+0x40/0x70 [ 959.583187] kobject: 'queues' (0000000084bbaa81): kobject_add_internal: parent: 'lo', set: '' [ 959.586804] ? __switch_to_asm+0x34/0x70 [ 959.590876] kobject: 'queues' (0000000084bbaa81): kobject_uevent_env [ 959.594923] ? __switch_to_asm+0x40/0x70 [ 959.594935] ? __switch_to_asm+0x34/0x70 [ 959.594946] ? __switch_to_asm+0x40/0x70 [ 959.594958] ? __switch_to_asm+0x34/0x70 [ 959.594987] ? __sched_text_start+0x8/0x8 [ 959.600885] kobject: 'queues' (0000000084bbaa81): kobject_uevent_env: filter function caused the event to drop! [ 959.603074] ? graph_lock+0x270/0x270 [ 959.603093] ? __sched_text_start+0x8/0x8 [ 959.603110] ? lockdep_hardirqs_on+0x421/0x5c0 [ 959.603126] ? find_held_lock+0x36/0x1c0 [ 959.607314] kobject: 'rx-0' (000000003d6a116a): kobject_add_internal: parent: 'queues', set: 'queues' [ 959.616370] ? lock_acquire+0x1ed/0x520 [ 959.616385] ? worker_thread+0x3e0/0x1390 [ 959.616406] ? kasan_check_read+0x11/0x20 [ 959.622516] kobject: 'rx-0' (000000003d6a116a): kobject_uevent_env [ 959.626948] ? do_raw_spin_lock+0x14f/0x350 [ 959.631034] kobject: 'rx-0' (000000003d6a116a): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 959.635059] ? __schedule+0x1ed0/0x1ed0 [ 959.635076] ? rwlock_bug.part.2+0x90/0x90 [ 959.635090] ? trace_hardirqs_on+0x310/0x310 [ 959.635117] worker_thread+0x17f/0x1390 [ 959.640827] kobject: 'tx-0' (0000000079440909): kobject_add_internal: parent: 'queues', set: 'queues' [ 959.643216] ? preempt_notifier_register+0x200/0x200 [ 959.643243] ? process_one_work+0x1c40/0x1c40 [ 959.643260] ? __schedule+0x874/0x1ed0 [ 959.643289] ? kmem_cache_alloc_trace+0x154/0x750 [ 959.647779] kobject: 'tx-0' (0000000079440909): kobject_uevent_env [ 959.657672] ? __sched_text_start+0x8/0x8 [ 959.657720] ? __kthread_parkme+0xce/0x1a0 [ 959.663299] kobject: 'tx-0' (0000000079440909): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 959.665666] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 959.672025] kobject: 'tunl0' (000000006010baf1): kobject_add_internal: parent: 'net', set: 'devices' [ 959.674298] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 959.684801] kobject: 'tunl0' (000000006010baf1): kobject_uevent_env [ 959.687636] ? lockdep_hardirqs_on+0x421/0x5c0 [ 959.692354] kobject: 'tunl0' (000000006010baf1): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 959.695957] ? trace_hardirqs_on+0xbd/0x310 [ 959.702831] kobject: 'queues' (00000000a7cbb708): kobject_add_internal: parent: 'tunl0', set: '' [ 959.706582] ? kasan_check_read+0x11/0x20 [ 959.717482] kobject: 'queues' (00000000a7cbb708): kobject_uevent_env [ 959.720962] ? __kthread_parkme+0xce/0x1a0 [ 959.725560] kobject: 'queues' (00000000a7cbb708): kobject_uevent_env: filter function caused the event to drop! [ 959.729586] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 959.733973] kobject: 'rx-0' (00000000f50d5e5e): kobject_add_internal: parent: 'queues', set: 'queues' [ 959.742913] ? __schedule+0x1ed0/0x1ed0 [ 959.742935] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 959.742953] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 959.742967] ? __kthread_parkme+0xfb/0x1a0 [ 959.742985] ? process_one_work+0x1c40/0x1c40 [ 959.749989] kobject: 'rx-0' (00000000f50d5e5e): kobject_uevent_env [ 959.752568] kthread+0x35a/0x440 [ 959.752582] ? kthread_bind+0x40/0x40 [ 959.752600] ret_from_fork+0x3a/0x50 [ 959.757594] Kernel Offset: disabled [ 959.924096] Rebooting in 86400 seconds..