\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1056.925701] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:06 executing program 0: semctl$GETALL(0x0, 0x6b000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xaa01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:06 executing program 1: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xe7010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1057.042276] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1057.077082] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:06 executing program 0: semctl$GETALL(0x0, 0xa6000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:06 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7100, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd4000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000ffffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1057.250750] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:06 executing program 0: semctl$GETALL(0x0, 0xfb01, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 1: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xe7010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:06 executing program 5: semget$private(0x0, 0x4007, 0x0) [ 1057.405465] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1057.439272] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:06 executing program 0: semctl$GETALL(0x0, 0xe600, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000feffff0700", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1057.546551] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:06 executing program 1: semget$private(0x0, 0x4007, 0x0) 10:06:06 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xe8010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:06 executing program 0: semctl$GETALL(0x0, 0x4f00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:06 executing program 1: semget$private(0x0, 0x0, 0x0) 10:06:06 executing program 0: semctl$GETALL(0x0, 0x6c00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:06 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x301, 0xd, &(0x7f00000000c0)=""/214) [ 1057.760245] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:07 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x52000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:07 executing program 0: semctl$GETALL(0x0, 0xf201, 0xd, &(0x7f00000000c0)=""/214) 10:06:07 executing program 1: semget$private(0x0, 0x4007, 0x0) 10:06:07 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1701000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:07 executing program 1: semget$private(0x0, 0x4007, 0x0) 10:06:07 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4a00, 0xd, &(0x7f00000000c0)=""/214) 10:06:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:07 executing program 0: semctl$GETALL(0x0, 0x46000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:07 executing program 1: semget$private(0x0, 0x4007, 0x0) 10:06:07 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc100, 0xd, &(0x7f00000000c0)=""/214) [ 1058.335867] xt_check_target: 21 callbacks suppressed [ 1058.335882] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:08 executing program 1: semget$private(0x0, 0x0, 0x0) 10:06:08 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x198, 0xd, &(0x7f00000000c0)=""/214) 10:06:08 executing program 0: semctl$GETALL(0x0, 0x32010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:08 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4a00, 0xd, &(0x7f00000000c0)=""/214) 10:06:08 executing program 0: semctl$GETALL(0x0, 0x4e, 0xd, &(0x7f00000000c0)=""/214) [ 1058.965433] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:08 executing program 0: semctl$GETALL(0x0, 0x3701000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:08 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x138, 0xd, &(0x7f00000000c0)=""/214) 10:06:08 executing program 1: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x41, 0xd, &(0x7f00000000c0)=""/214) 10:06:08 executing program 0: semctl$GETALL(0x0, 0xaa00000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1059.190652] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1059.200825] device bridge_slave_1 left promiscuous mode [ 1059.206334] bridge0: port 2(bridge_slave_1) entered disabled state 10:06:08 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd901, 0xd, &(0x7f00000000c0)=""/214) [ 1059.270228] device bridge_slave_0 left promiscuous mode [ 1059.279396] bridge0: port 1(bridge_slave_0) entered disabled state [ 1059.426959] IPVS: ftp: loaded support on port[0] = 21 [ 1059.451120] team0 (unregistering): Port device team_slave_1 removed [ 1059.461311] team0 (unregistering): Port device team_slave_0 removed [ 1059.472289] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1059.501385] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1059.586948] bond0 (unregistering): Released all slaves [ 1060.455128] bridge0: port 1(bridge_slave_0) entered blocking state [ 1060.462013] bridge0: port 1(bridge_slave_0) entered disabled state [ 1060.469724] device bridge_slave_0 entered promiscuous mode [ 1060.511417] bridge0: port 2(bridge_slave_1) entered blocking state [ 1060.518018] bridge0: port 2(bridge_slave_1) entered disabled state [ 1060.525197] device bridge_slave_1 entered promiscuous mode [ 1060.566862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1060.608597] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1060.737204] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1060.785836] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1060.829182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1060.836072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1060.877708] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1060.884567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1060.975058] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1060.982367] team0: Port device team_slave_0 added [ 1061.009620] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1061.016967] team0: Port device team_slave_1 added [ 1061.060680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1061.105371] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1061.132393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1061.140107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1061.149539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1061.184010] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1061.191609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1061.203014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1061.474560] bridge0: port 2(bridge_slave_1) entered blocking state [ 1061.481208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1061.487858] bridge0: port 1(bridge_slave_0) entered blocking state [ 1061.494192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1061.501621] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1061.747522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1062.401052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1062.493379] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1062.585718] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1062.591914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1062.599505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1062.686685] 8021q: adding VLAN 0 to HW filter on device team0 [ 1063.273730] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1063.283647] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:12 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8d01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:12 executing program 1: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa700000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:12 executing program 0: semctl$GETALL(0x0, 0xca010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:12 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb001000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1063.354939] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:12 executing program 0: semctl$GETALL(0x0, 0x3f000000, 0xd, &(0x7f00000000c0)=""/214) [ 1063.416050] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:12 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x194, 0xd, &(0x7f00000000c0)=""/214) 10:06:12 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8d01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:12 executing program 1: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x114, 0xd, &(0x7f00000000c0)=""/214) [ 1063.459928] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1063.487408] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:12 executing program 0: semctl$GETALL(0x0, 0x53000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000ffffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000ffffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:12 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd901000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:12 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:12 executing program 0: semctl$GETALL(0x0, 0x39, 0xd, &(0x7f00000000c0)=""/214) [ 1063.717194] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1063.725798] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:12 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xfd00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1063.841636] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:13 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd4010000, 0xd, &(0x7f00000000c0)=""/214) [ 1063.885297] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:13 executing program 0: semctl$GETALL(0x0, 0x47, 0xd, &(0x7f00000000c0)=""/214) [ 1063.926867] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1063.948443] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:13 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x49, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:13 executing program 0: semctl$GETALL(0x0, 0x9800, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:13 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf000, 0xd, &(0x7f00000000c0)=""/214) [ 1064.093831] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:13 executing program 0: semctl$GETALL(0x0, 0xff00, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x115, 0xd, &(0x7f00000000c0)=""/214) [ 1064.164854] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1064.187516] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:13 executing program 1: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xcc00, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:13 executing program 0: semctl$GETALL(0x0, 0x6a01, 0xd, &(0x7f00000000c0)=""/214) [ 1064.342409] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1064.357087] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:13 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc01, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1b0, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 0: semctl$GETALL(0x0, 0x39000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 1: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x88010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1064.502458] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1064.522783] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:13 executing program 0: semctl$GETALL(0x0, 0xd500, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000380100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:13 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1800, 0xd, &(0x7f00000000c0)=""/214) [ 1064.639322] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1064.665067] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:13 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7a000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 1: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4e010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1064.709342] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:13 executing program 0: semctl$GETALL(0x0, 0xc901000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1064.839323] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:14 executing program 0: semctl$GETALL(0x0, 0x4e000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 1: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3400000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:14 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8200000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4c, 0xd, &(0x7f00000000c0)=""/214) [ 1064.958968] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:14 executing program 0: semctl$GETALL(0x0, 0x12f, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1065.015225] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:14 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3200, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x134, 0xd, &(0x7f00000000c0)=""/214) [ 1065.137774] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:14 executing program 1: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 0: semctl$GETALL(0x0, 0x4c01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1065.263471] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1065.300988] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:14 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4600, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4101, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 0: semctl$GETALL(0x0, 0xc8010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1065.421102] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:14 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5100, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 0: semctl$GETALL(0x0, 0x89010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 1: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x59010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB='[d%:]%62:'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)="2cf073656c696e75786367726f757000") [ 1065.663011] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1065.701202] libceph: parse_ips bad ip '[d%:]%62' 10:06:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:14 executing program 0: semctl$GETALL(0x0, 0xcc01, 0xd, &(0x7f00000000c0)=""/214) 10:06:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1065.712797] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:15 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1a6, 0xd, &(0x7f00000000c0)=""/214) 10:06:15 executing program 0: semctl$GETALL(0x0, 0x3401000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:15 executing program 1 (fault-call:0 fault-nth:0): semget$private(0x0, 0x4007, 0x0) 10:06:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1065.815847] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1065.840296] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:15 executing program 0: semctl$GETALL(0x0, 0x1600000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1065.933376] FAULT_INJECTION: forcing a failure. [ 1065.933376] name failslab, interval 1, probability 0, space 0, times 0 [ 1065.984378] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1065.997423] CPU: 0 PID: 10207 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #281 [ 1066.004916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1066.014272] Call Trace: [ 1066.016868] dump_stack+0x1c4/0x2b4 [ 1066.020504] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1066.025721] should_fail.cold.4+0xa/0x17 10:06:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1066.029809] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1066.035021] ? graph_lock+0x170/0x170 [ 1066.038835] ? mark_held_locks+0x130/0x130 [ 1066.043079] ? graph_lock+0x170/0x170 [ 1066.046895] ? __lock_acquire+0x7ec/0x4ec0 [ 1066.051141] ? find_held_lock+0x36/0x1c0 [ 1066.055219] ? __lock_is_held+0xb5/0x140 [ 1066.059300] ? ___might_sleep+0x1ed/0x300 [ 1066.063457] ? arch_local_save_flags+0x40/0x40 [ 1066.066321] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1066.068052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1066.068112] __should_failslab+0x124/0x180 [ 1066.086038] should_failslab+0x9/0x14 [ 1066.088636] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1066.089837] kmem_cache_alloc_node_trace+0x270/0x740 [ 1066.089856] ? zap_class+0x640/0x640 [ 1066.106809] __kmalloc_node+0x33/0x70 [ 1066.110626] kvmalloc_node+0xb9/0xf0 [ 1066.114351] newary+0x244/0xb40 [ 1066.117644] ? semctl_stat+0x5f0/0x5f0 [ 1066.121533] ? lock_acquire+0x1ed/0x520 [ 1066.125512] ? ipcget+0x125/0x11b0 [ 1066.129068] ? lock_release+0x970/0x970 [ 1066.133054] ? arch_local_save_flags+0x40/0x40 [ 1066.137641] ? perf_trace_lock+0x14d/0x7a0 [ 1066.137673] ? down_write+0x8a/0x130 [ 1066.137686] ? ipcget+0x125/0x11b0 [ 1066.137704] ? down_read+0x1d0/0x1d0 [ 1066.145623] ? __f_unlock_pos+0x19/0x20 [ 1066.145639] ? lock_downgrade+0x900/0x900 [ 1066.145658] ipcget+0x15d/0x11b0 [ 1066.164360] ? find_held_lock+0x36/0x1c0 [ 1066.168531] ? ipc_obtain_object_check+0xc0/0xc0 [ 1066.173297] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1066.178265] ? wait_for_completion+0x8a0/0x8a0 [ 1066.182881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1066.188426] ? check_preemption_disabled+0x48/0x200 [ 1066.193483] ? __sb_end_write+0xd9/0x110 [ 1066.197560] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1066.203083] ksys_semget+0x1c0/0x280 [ 1066.206784] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1066.211348] ? sem_exit_ns+0x40/0x40 [ 1066.215057] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1066.220493] __x64_sys_semget+0x73/0xb0 [ 1066.224452] do_syscall_64+0x1b9/0x820 [ 1066.228336] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1066.233684] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1066.238601] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1066.243949] ? trace_hardirqs_on_caller+0x310/0x310 [ 1066.249016] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1066.254120] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1066.259121] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1066.263973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1066.269154] RIP: 0033:0x457569 10:06:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:15 executing program 0: semctl$GETALL(0x0, 0x2400, 0xd, &(0x7f00000000c0)=""/214) [ 1066.272328] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1066.291309] RSP: 002b:00007fa4627e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000040 [ 1066.299130] RAX: ffffffffffffffda RBX: 00007fa4627e7c90 RCX: 0000000000457569 [ 1066.306486] RDX: 0000000000000000 RSI: 0000000000004007 RDI: 0000000000000000 [ 1066.313747] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1066.321002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa4627e86d4 [ 1066.328270] R13: 00000000004c34b0 R14: 00000000004d5250 R15: 0000000000000003 10:06:15 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x67, 0xd, &(0x7f00000000c0)=""/214) 10:06:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:15 executing program 1 (fault-call:0 fault-nth:1): semget$private(0x0, 0x4007, 0x0) 10:06:15 executing program 5 (fault-call:0 fault-nth:0): semget$private(0x0, 0x4007, 0x0) 10:06:15 executing program 0: semctl$GETALL(0x0, 0x6c01, 0xd, &(0x7f00000000c0)=""/214) [ 1066.426991] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1066.445545] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1066.467133] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1066.556009] FAULT_INJECTION: forcing a failure. [ 1066.556009] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1066.567938] CPU: 0 PID: 10251 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #281 [ 1066.575300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1066.584656] Call Trace: [ 1066.587254] dump_stack+0x1c4/0x2b4 [ 1066.590913] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1066.596127] should_fail.cold.4+0xa/0x17 [ 1066.600204] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1066.604586] FAULT_INJECTION: forcing a failure. [ 1066.604586] name failslab, interval 1, probability 0, space 0, times 0 [ 1066.605311] ? print_usage_bug+0xc0/0xc0 [ 1066.605328] ? check_preemption_disabled+0x48/0x200 [ 1066.605354] ? mark_held_locks+0x130/0x130 [ 1066.629825] ? print_usage_bug+0xc0/0xc0 [ 1066.632556] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1066.633894] ? __lock_acquire+0x7ec/0x4ec0 [ 1066.633907] ? zap_class+0x640/0x640 [ 1066.633926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1066.655497] ? check_preemption_disabled+0x48/0x200 [ 1066.660521] ? debug_smp_processor_id+0x1c/0x20 [ 1066.665185] ? perf_trace_lock+0x14d/0x7a0 [ 1066.665203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1066.665218] ? should_fail+0x22d/0xd01 [ 1066.678857] ? zap_class+0x640/0x640 [ 1066.682567] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1066.687660] __alloc_pages_nodemask+0x34b/0xde0 [ 1066.692326] ? mark_held_locks+0x130/0x130 [ 1066.696557] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 1066.701592] ? find_held_lock+0x36/0x1c0 [ 1066.705650] ? ___might_sleep+0x1ed/0x300 [ 1066.709785] ? trace_hardirqs_off+0xb8/0x310 [ 1066.714210] cache_grow_begin+0x91/0x8c0 [ 1066.718258] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1066.723784] ? check_preemption_disabled+0x48/0x200 [ 1066.728788] kmem_cache_alloc_node_trace+0x670/0x740 [ 1066.733902] ? zap_class+0x640/0x640 [ 1066.737632] __kmalloc_node+0x33/0x70 [ 1066.741443] kvmalloc_node+0xb9/0xf0 [ 1066.745144] newary+0x244/0xb40 [ 1066.748417] ? semctl_stat+0x5f0/0x5f0 [ 1066.752293] ? lock_acquire+0x1ed/0x520 [ 1066.756258] ? ipcget+0x125/0x11b0 [ 1066.759903] ? lock_release+0x970/0x970 [ 1066.763861] ? arch_local_save_flags+0x40/0x40 [ 1066.768431] ? perf_trace_lock+0x14d/0x7a0 [ 1066.772657] ? down_write+0x8a/0x130 [ 1066.776352] ? ipcget+0x125/0x11b0 [ 1066.779982] ? down_read+0x1d0/0x1d0 [ 1066.783682] ? __f_unlock_pos+0x19/0x20 [ 1066.787738] ? lock_downgrade+0x900/0x900 [ 1066.791964] ipcget+0x15d/0x11b0 [ 1066.795330] ? find_held_lock+0x36/0x1c0 [ 1066.799380] ? ipc_obtain_object_check+0xc0/0xc0 [ 1066.804123] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1066.809040] ? wait_for_completion+0x8a0/0x8a0 [ 1066.813617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1066.819138] ? check_preemption_disabled+0x48/0x200 [ 1066.824145] ? __sb_end_write+0xd9/0x110 [ 1066.828206] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1066.833749] ksys_semget+0x1c0/0x280 [ 1066.837449] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1066.842013] ? sem_exit_ns+0x40/0x40 [ 1066.845724] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1066.851184] __x64_sys_semget+0x73/0xb0 [ 1066.855148] do_syscall_64+0x1b9/0x820 [ 1066.859040] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1066.864390] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1066.869320] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1066.874147] ? trace_hardirqs_on_caller+0x310/0x310 [ 1066.879151] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1066.884150] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1066.889167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1066.894002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1066.899179] RIP: 0033:0x457569 [ 1066.902360] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1066.921243] RSP: 002b:00007fa4627e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000040 [ 1066.928944] RAX: ffffffffffffffda RBX: 00007fa4627e7c90 RCX: 0000000000457569 [ 1066.936196] RDX: 0000000000000000 RSI: 0000000000004007 RDI: 0000000000000000 [ 1066.943461] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1066.950716] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa4627e86d4 10:06:16 executing program 0: semctl$GETALL(0x0, 0x12b, 0xd, &(0x7f00000000c0)=""/214) 10:06:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:16 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4600000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1066.957968] R13: 00000000004c34b0 R14: 00000000004d5250 R15: 0000000000000003 10:06:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1067.008016] CPU: 1 PID: 10254 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #281 [ 1067.015409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.024760] Call Trace: [ 1067.027355] dump_stack+0x1c4/0x2b4 [ 1067.031017] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1067.036314] should_fail.cold.4+0xa/0x17 [ 1067.040389] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1067.045496] ? graph_lock+0x170/0x170 [ 1067.049298] ? mark_held_locks+0x130/0x130 [ 1067.053518] ? graph_lock+0x170/0x170 [ 1067.057424] ? __lock_acquire+0x7ec/0x4ec0 [ 1067.061666] ? find_held_lock+0x36/0x1c0 [ 1067.065726] ? __lock_is_held+0xb5/0x140 [ 1067.069779] ? ___might_sleep+0x1ed/0x300 [ 1067.073912] ? arch_local_save_flags+0x40/0x40 [ 1067.078480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1067.084006] __should_failslab+0x124/0x180 [ 1067.088226] should_failslab+0x9/0x14 [ 1067.092016] kmem_cache_alloc_node_trace+0x270/0x740 [ 1067.097456] ? zap_class+0x640/0x640 [ 1067.101179] __kmalloc_node+0x33/0x70 [ 1067.104971] kvmalloc_node+0xb9/0xf0 [ 1067.108697] newary+0x244/0xb40 [ 1067.111972] ? semctl_stat+0x5f0/0x5f0 [ 1067.115843] ? lock_acquire+0x1ed/0x520 [ 1067.119820] ? ipcget+0x125/0x11b0 [ 1067.123349] ? lock_release+0x970/0x970 [ 1067.127317] ? arch_local_save_flags+0x40/0x40 [ 1067.131886] ? perf_trace_lock+0x14d/0x7a0 [ 1067.136112] ? down_write+0x8a/0x130 [ 1067.139806] ? ipcget+0x125/0x11b0 [ 1067.143331] ? down_read+0x1d0/0x1d0 [ 1067.147034] ? __f_unlock_pos+0x19/0x20 [ 1067.150998] ? lock_downgrade+0x900/0x900 [ 1067.155135] ipcget+0x15d/0x11b0 [ 1067.158511] ? find_held_lock+0x36/0x1c0 [ 1067.162570] ? ipc_obtain_object_check+0xc0/0xc0 [ 1067.167315] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1067.172248] ? wait_for_completion+0x8a0/0x8a0 [ 1067.176927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1067.182464] ? check_preemption_disabled+0x48/0x200 [ 1067.187469] ? __sb_end_write+0xd9/0x110 [ 1067.191535] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1067.197069] ksys_semget+0x1c0/0x280 [ 1067.200770] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1067.205336] ? sem_exit_ns+0x40/0x40 [ 1067.209047] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1067.214484] __x64_sys_semget+0x73/0xb0 [ 1067.218449] do_syscall_64+0x1b9/0x820 [ 1067.222328] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1067.227678] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1067.232611] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1067.237442] ? trace_hardirqs_on_caller+0x310/0x310 [ 1067.242447] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1067.247452] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1067.252464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1067.257297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1067.262473] RIP: 0033:0x457569 [ 1067.265653] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1067.284541] RSP: 002b:00007f26cb25dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000040 [ 1067.292320] RAX: ffffffffffffffda RBX: 00007f26cb25dc90 RCX: 0000000000457569 [ 1067.299570] RDX: 0000000000000000 RSI: 0000000000004007 RDI: 0000000000000000 10:06:16 executing program 0: semctl$GETALL(0x0, 0x7a010000, 0xd, &(0x7f00000000c0)=""/214) [ 1067.306822] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1067.314075] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26cb25e6d4 [ 1067.321330] R13: 00000000004c34b0 R14: 00000000004d5250 R15: 0000000000000003 10:06:16 executing program 0: semctl$GETALL(0x0, 0x1c2, 0xd, &(0x7f00000000c0)=""/214) [ 1067.402139] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:16 executing program 1: semget$private(0x0, 0x4007, 0x0) [ 1067.451223] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:16 executing program 5: semget$private(0x0, 0x4007, 0x0) 10:06:16 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf5010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:16 executing program 0: semctl$GETALL(0x0, 0x21010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:16 executing program 1: semget$private(0x1700, 0x4007, 0x0) 10:06:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:16 executing program 0: semctl$GETALL(0x0, 0x1600, 0xd, &(0x7f00000000c0)=""/214) 10:06:16 executing program 1: semget$private(0x1f2, 0x4007, 0x0) [ 1067.754386] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:17 executing program 0: semctl$GETALL(0x0, 0xfc, 0xd, &(0x7f00000000c0)=""/214) [ 1067.798451] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:17 executing program 5: semget$private(0x6600000000000000, 0x4007, 0x0) 10:06:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:17 executing program 1: semget$private(0xfd01000000000000, 0x4007, 0x0) 10:06:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:17 executing program 0: semctl$GETALL(0x0, 0xd2, 0xd, &(0x7f00000000c0)=""/214) [ 1067.981150] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1068.046529] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1068.220819] syz-executor3 (10290) used greatest stack depth: 7912 bytes left 10:06:17 executing program 0: semctl$GETALL(0x0, 0x5e00, 0xd, &(0x7f00000000c0)=""/214) 10:06:17 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4c000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:17 executing program 1: semget$private(0x35000000, 0x4007, 0x0) 10:06:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:17 executing program 0: semctl$GETALL(0x0, 0x7601, 0xd, &(0x7f00000000c0)=""/214) 10:06:17 executing program 1: semget$private(0xda00, 0x4007, 0x0) [ 1068.512455] blkid (10333) used greatest stack depth: 7272 bytes left 10:06:18 executing program 5: semget$private(0xf000000, 0x4007, 0x0) 10:06:18 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd3010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:18 executing program 5: semget$private(0x21030000, 0x4007, 0x0) 10:06:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000400200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:18 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9701, 0xd, &(0x7f00000000c0)=""/214) 10:06:18 executing program 5: semget$private(0x25030000, 0x4007, 0x0) 10:06:18 executing program 5: semget$private(0xd200, 0x4007, 0x0) [ 1069.445748] IPVS: ftp: loaded support on port[0] = 21 10:06:18 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xab, 0xd, &(0x7f00000000c0)=""/214) 10:06:18 executing program 5: semget$private(0xf0ffffff, 0x4007, 0x0) 10:06:18 executing program 0: semctl$GETALL(0x0, 0x800000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1069.689544] syz-executor1 (6779) used greatest stack depth: 6936 bytes left 10:06:18 executing program 5: semget$private(0xa000000, 0x4007, 0x0) 10:06:18 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x179, 0xd, &(0x7f00000000c0)=""/214) 10:06:18 executing program 1: semget$private(0x6001, 0x4007, 0x0) [ 1069.975146] IPVS: ftp: loaded support on port[0] = 21 [ 1069.986529] IPVS: ftp: loaded support on port[0] = 21 [ 1069.991852] device bridge_slave_1 left promiscuous mode [ 1070.003111] bridge0: port 2(bridge_slave_1) entered disabled state [ 1070.009256] IPVS: ftp: loaded support on port[0] = 21 [ 1070.048048] device bridge_slave_0 left promiscuous mode [ 1070.053537] bridge0: port 1(bridge_slave_0) entered disabled state [ 1070.125265] team0 (unregistering): Port device team_slave_1 removed [ 1070.135016] team0 (unregistering): Port device team_slave_0 removed [ 1070.146001] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1070.210867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1070.274471] bond0 (unregistering): Released all slaves [ 1071.559738] bridge0: port 1(bridge_slave_0) entered blocking state [ 1071.566117] bridge0: port 1(bridge_slave_0) entered disabled state [ 1071.581846] device bridge_slave_0 entered promiscuous mode [ 1071.679773] bridge0: port 2(bridge_slave_1) entered blocking state [ 1071.686315] bridge0: port 2(bridge_slave_1) entered disabled state [ 1071.703916] device bridge_slave_1 entered promiscuous mode [ 1071.781981] bridge0: port 1(bridge_slave_0) entered blocking state [ 1071.793936] bridge0: port 1(bridge_slave_0) entered disabled state [ 1071.803435] device bridge_slave_0 entered promiscuous mode [ 1071.839103] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1071.897112] bridge0: port 2(bridge_slave_1) entered blocking state [ 1071.916522] bridge0: port 2(bridge_slave_1) entered disabled state [ 1071.924059] device bridge_slave_1 entered promiscuous mode [ 1071.956511] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1072.001658] bridge0: port 1(bridge_slave_0) entered blocking state [ 1072.014188] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.021653] device bridge_slave_0 entered promiscuous mode [ 1072.030186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1072.054776] bridge0: port 1(bridge_slave_0) entered blocking state [ 1072.077449] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.084856] device bridge_slave_0 entered promiscuous mode [ 1072.115133] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1072.140070] bridge0: port 2(bridge_slave_1) entered blocking state [ 1072.146420] bridge0: port 2(bridge_slave_1) entered disabled state [ 1072.172771] device bridge_slave_1 entered promiscuous mode [ 1072.191959] bridge0: port 2(bridge_slave_1) entered blocking state [ 1072.215314] bridge0: port 2(bridge_slave_1) entered disabled state [ 1072.248387] device bridge_slave_1 entered promiscuous mode [ 1072.263480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1072.345300] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1072.363206] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1072.402807] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1072.452535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1072.509196] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1072.532025] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1072.585347] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1072.612564] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1072.625957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1072.644192] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1072.726123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1072.733933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1072.751634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1072.769003] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1072.777090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1072.802400] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1072.825787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1072.844986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1072.880658] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1073.096067] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1073.112754] team0: Port device team_slave_0 added [ 1073.126309] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1073.139049] team0: Port device team_slave_0 added [ 1073.206092] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1073.216289] team0: Port device team_slave_1 added [ 1073.222775] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1073.230788] team0: Port device team_slave_1 added [ 1073.255078] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1073.278052] team0: Port device team_slave_0 added [ 1073.304694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1073.320025] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1073.329593] team0: Port device team_slave_0 added [ 1073.580122] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1073.587225] team0: Port device team_slave_1 added [ 1073.596682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1073.623107] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1073.638512] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1073.647884] team0: Port device team_slave_1 added [ 1073.799534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1073.809062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1073.815947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1073.826195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1073.834844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1073.843681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1073.870036] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1073.879394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1074.087068] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1074.103702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1074.122043] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1074.131773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1074.139994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1074.147941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1074.159925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1074.170318] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1074.178600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1074.186218] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1074.224487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1074.236338] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1074.255287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1074.275416] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1074.284181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1074.292328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1074.481762] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1074.492324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1074.508812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1074.524661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1074.538185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1074.566038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1074.580211] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1074.730361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1074.738995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1074.760430] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1074.770379] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1074.781712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1074.797921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1074.805914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1074.819602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1075.529304] device bridge_slave_1 left promiscuous mode [ 1075.534819] bridge0: port 2(bridge_slave_1) entered disabled state [ 1075.598444] device bridge_slave_0 left promiscuous mode [ 1075.603871] bridge0: port 1(bridge_slave_0) entered disabled state [ 1075.649002] device bridge_slave_1 left promiscuous mode [ 1075.654430] bridge0: port 2(bridge_slave_1) entered disabled state [ 1075.688227] device bridge_slave_0 left promiscuous mode [ 1075.693747] bridge0: port 1(bridge_slave_0) entered disabled state [ 1075.738616] device bridge_slave_1 left promiscuous mode [ 1075.744062] bridge0: port 2(bridge_slave_1) entered disabled state [ 1075.798159] device bridge_slave_0 left promiscuous mode [ 1075.803629] bridge0: port 1(bridge_slave_0) entered disabled state [ 1077.754731] team0 (unregistering): Port device team_slave_1 removed [ 1077.764380] team0 (unregistering): Port device team_slave_0 removed [ 1077.774552] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1077.811640] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1077.895231] bond0 (unregistering): Released all slaves [ 1077.960831] team0 (unregistering): Port device team_slave_1 removed [ 1077.971046] team0 (unregistering): Port device team_slave_0 removed [ 1077.981270] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1078.040476] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1078.096219] bond0 (unregistering): Released all slaves [ 1078.161489] team0 (unregistering): Port device team_slave_1 removed [ 1078.174923] team0 (unregistering): Port device team_slave_0 removed [ 1078.185305] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1078.230937] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1078.295479] bond0 (unregistering): Released all slaves [ 1078.581743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.588175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1078.594832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.601207] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1078.609569] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1078.774808] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.781417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1078.788092] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.794437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1078.812911] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1078.919772] bridge0: port 2(bridge_slave_1) entered blocking state [ 1078.926135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1078.932838] bridge0: port 1(bridge_slave_0) entered blocking state [ 1078.939200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1078.962074] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1079.040738] bridge0: port 2(bridge_slave_1) entered blocking state [ 1079.047099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1079.053741] bridge0: port 1(bridge_slave_0) entered blocking state [ 1079.060120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1079.068494] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1079.457412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1079.465104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1079.488362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1079.507749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1082.434867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1082.471689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1082.631605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1082.667845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1082.677034] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1082.773867] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1082.916511] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1082.937690] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1082.944521] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1082.950745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1082.968563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1083.017665] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1083.024430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1083.037744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1083.204615] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1083.210877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1083.225693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1083.236593] 8021q: adding VLAN 0 to HW filter on device team0 [ 1083.253493] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1083.265987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1083.274153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1083.301981] 8021q: adding VLAN 0 to HW filter on device team0 [ 1083.478887] 8021q: adding VLAN 0 to HW filter on device team0 [ 1083.548360] 8021q: adding VLAN 0 to HW filter on device team0 10:06:34 executing program 5: semget$private(0x2000, 0x4007, 0x0) 10:06:34 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1d0, 0xd, &(0x7f00000000c0)=""/214) 10:06:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1084.839680] xt_check_target: 18 callbacks suppressed [ 1084.839696] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:34 executing program 5: semget$private(0x18000000, 0x4007, 0x0) 10:06:34 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x142, 0xd, &(0x7f00000000c0)=""/214) 10:06:34 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1084.949905] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1084.970115] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:34 executing program 5: semget$private(0x66000000, 0x4007, 0x0) [ 1085.097229] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1085.118602] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1085.147230] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:34 executing program 0: semctl$GETALL(0x0, 0x8000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:34 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd1010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:34 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:34 executing program 5: semget$private(0xdb02, 0x4007, 0x0) 10:06:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:34 executing program 1: semget$private(0x6301, 0x4007, 0x0) [ 1085.332222] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1085.364100] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:34 executing program 1: semget$private(0xa, 0x4007, 0x0) 10:06:34 executing program 0: semctl$GETALL(0x0, 0x1f0, 0xd, &(0x7f00000000c0)=""/214) 10:06:34 executing program 5: semget$private(0xda00, 0x4007, 0x0) 10:06:34 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xbd00, 0xd, &(0x7f00000000c0)=""/214) 10:06:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1085.399597] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:34 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:34 executing program 1: semget$private(0xe00000000000000, 0x4007, 0x0) 10:06:34 executing program 5: semget$private(0x6700000000000000, 0x4007, 0x0) 10:06:34 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xce01000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1085.499664] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1085.539799] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:34 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:34 executing program 0: semctl$GETALL(0x0, 0xc801, 0xd, &(0x7f00000000c0)=""/214) 10:06:34 executing program 1: semget$private(0xfeff, 0x4007, 0x0) 10:06:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:34 executing program 1: semget$private(0xdf000000, 0x4007, 0x0) 10:06:34 executing program 5: semget$private(0xfeffffff, 0x4007, 0x0) 10:06:34 executing program 0: semctl$GETALL(0x0, 0x9000, 0xd, &(0x7f00000000c0)=""/214) [ 1085.653369] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1085.672856] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:34 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:35 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8301, 0xd, &(0x7f00000000c0)=""/214) 10:06:35 executing program 1: semget$private(0x3f000000, 0x4007, 0x0) 10:06:35 executing program 5: semget$private(0x2103000000000000, 0x4007, 0x0) 10:06:35 executing program 0: semctl$GETALL(0x0, 0x17f, 0xd, &(0x7f00000000c0)=""/214) [ 1085.873152] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1085.904660] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1085.905011] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:35 executing program 1: semget$private(0xfffffffffffffffe, 0x4007, 0x0) 10:06:35 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xcf000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:35 executing program 0: semctl$GETALL(0x0, 0x79, 0xd, &(0x7f00000000c0)=""/214) 10:06:35 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:35 executing program 5: semget$private(0x1000000, 0x4007, 0x0) 10:06:35 executing program 1: semget$private(0x161, 0x4007, 0x0) 10:06:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:35 executing program 5: semget$private(0xf00, 0x4007, 0x0) [ 1086.138638] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1086.174246] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:35 executing program 1: semget$private(0x1400000000000000, 0x4007, 0x0) 10:06:35 executing program 0: semctl$GETALL(0x0, 0x2d000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:35 executing program 5: semget$private(0xa03, 0x4007, 0x0) [ 1086.192672] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:35 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd500, 0xd, &(0x7f00000000c0)=""/214) 10:06:35 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:35 executing program 5: semget$private(0xfffffff0, 0x4007, 0x0) 10:06:35 executing program 0: semctl$GETALL(0x0, 0xda01, 0xd, &(0x7f00000000c0)=""/214) [ 1086.331722] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1086.353024] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:35 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8f00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:35 executing program 5: semget$private(0x300000000000000, 0x4007, 0x0) [ 1086.379802] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:35 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:35 executing program 1: semget$private(0x3f00000000000000, 0x4007, 0x0) 10:06:35 executing program 0: semctl$GETALL(0x0, 0x1101, 0xd, &(0x7f00000000c0)=""/214) 10:06:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:35 executing program 0: semctl$GETALL(0x0, 0x5, 0xd, &(0x7f00000000c0)=""/214) [ 1086.524447] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:35 executing program 1: semget$private(0xe000000, 0x4007, 0x0) 10:06:35 executing program 5: semget$private(0x67000000, 0x4007, 0x0) [ 1086.565664] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1086.576958] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:35 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:35 executing program 1: semget$private(0xf0ffffff, 0x4007, 0x0) 10:06:35 executing program 5: semget$private(0x4200, 0x4007, 0x0) 10:06:35 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:35 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4c00000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1086.727953] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1086.742604] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:35 executing program 0: semctl$GETALL(0x0, 0x150, 0xd, &(0x7f00000000c0)=""/214) 10:06:36 executing program 1: semget$private(0x2000, 0x4007, 0x0) 10:06:36 executing program 5: semget$private(0x400000000000000, 0x4007, 0x0) 10:06:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1086.788931] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1086.805307] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:36 executing program 0: semctl$GETALL(0x0, 0x7100000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:36 executing program 0: semctl$GETALL(0x0, 0x8010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:36 executing program 1: semget$private(0x14, 0x4007, 0x0) [ 1086.935516] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1086.998840] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:36 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x55, 0xd, &(0x7f00000000c0)=""/214) 10:06:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:36 executing program 0: semctl$GETALL(0x0, 0x60000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:36 executing program 5: semget$private(0x8030000, 0x4007, 0x0) 10:06:36 executing program 1: semget$private(0x1f4, 0x4007, 0x0) 10:06:36 executing program 1: semget$private(0xb000000, 0x4007, 0x0) [ 1087.110366] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:36 executing program 5: semget$private(0x2000000, 0x4007, 0x0) 10:06:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:36 executing program 0: semctl$GETALL(0x0, 0x5201, 0xd, &(0x7f00000000c0)=""/214) 10:06:36 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xba01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:36 executing program 1: semget$private(0xf201, 0x4007, 0x0) [ 1087.277879] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:36 executing program 5: semget$private(0xd3000000, 0x4007, 0x0) 10:06:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:36 executing program 0: semctl$GETALL(0x0, 0xf801000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000feffff0700", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:36 executing program 1: semget$private(0x1fa, 0x4007, 0x0) 10:06:36 executing program 5: semget$private(0xf0ffffff00000000, 0x4007, 0x0) 10:06:36 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd700000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1087.467110] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:36 executing program 0: semctl$GETALL(0x0, 0x9701000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:36 executing program 1: semget$private(0x13, 0x4007, 0x0) 10:06:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1087.535428] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:36 executing program 1: semget$private(0x36, 0x4007, 0x0) 10:06:36 executing program 0: semctl$GETALL(0x0, 0x22000000, 0xd, &(0x7f00000000c0)=""/214) [ 1087.705216] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:37 executing program 0: semctl$GETALL(0x0, 0x2b010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:37 executing program 1: semget$private(0x1300000000000000, 0x4007, 0x0) [ 1087.890793] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1087.934302] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:37 executing program 0: semctl$GETALL(0x0, 0x74000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:37 executing program 5: semget$private(0x4000000000000000, 0x4007, 0x0) 10:06:37 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:37 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x90000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:37 executing program 0: semctl$GETALL(0x0, 0xc901, 0xd, &(0x7f00000000c0)=""/214) [ 1088.237114] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1088.264266] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:37 executing program 0: semctl$GETALL(0x0, 0x5800, 0xd, &(0x7f00000000c0)=""/214) 10:06:37 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:37 executing program 5: semget$private(0xa, 0x4007, 0x0) 10:06:37 executing program 5: semget$private(0x4500000000000000, 0x4007, 0x0) 10:06:38 executing program 1: semget$private(0xc000000, 0x4007, 0x0) 10:06:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7a01, 0xd, &(0x7f00000000c0)=""/214) 10:06:38 executing program 1: semget$private(0x3f00, 0x4007, 0x0) 10:06:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xad01, 0xd, &(0x7f00000000c0)=""/214) 10:06:38 executing program 1: semget$private(0x5, 0x4007, 0x0) 10:06:38 executing program 0: semctl$GETALL(0x0, 0xc301, 0xd, &(0x7f00000000c0)=""/214) 10:06:38 executing program 5: semget$private(0xa03000000000000, 0x4007, 0x0) 10:06:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xdc00, 0xd, &(0x7f00000000c0)=""/214) 10:06:38 executing program 1: semget$private(0x3900000000000000, 0x4007, 0x0) 10:06:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:38 executing program 1: semget$private(0x1000000, 0x4007, 0x0) 10:06:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7400, 0xd, &(0x7f00000000c0)=""/214) [ 1089.597936] device bridge_slave_1 left promiscuous mode [ 1089.603488] bridge0: port 2(bridge_slave_1) entered disabled state [ 1089.657641] device bridge_slave_0 left promiscuous mode [ 1089.663229] bridge0: port 1(bridge_slave_0) entered disabled state [ 1089.666431] IPVS: ftp: loaded support on port[0] = 21 [ 1089.696316] IPVS: ftp: loaded support on port[0] = 21 10:06:38 executing program 1: semget$private(0x17000000, 0x4007, 0x0) [ 1089.815761] IPVS: ftp: loaded support on port[0] = 21 [ 1089.823786] IPVS: ftp: loaded support on port[0] = 21 [ 1089.831738] team0 (unregistering): Port device team_slave_1 removed [ 1089.855725] team0 (unregistering): Port device team_slave_0 removed 10:06:39 executing program 1: semget$private(0xfffffffe, 0x4007, 0x0) 10:06:39 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf8, 0xd, &(0x7f00000000c0)=""/214) [ 1089.880526] bond0 (unregistering): Releasing backup interface bond_slave_1 10:06:39 executing program 1: semget$private(0xc00000000000000, 0x4007, 0x0) [ 1089.928529] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1090.024358] bond0 (unregistering): Released all slaves [ 1091.818330] bridge0: port 1(bridge_slave_0) entered blocking state [ 1091.824731] bridge0: port 1(bridge_slave_0) entered disabled state [ 1091.832668] device bridge_slave_0 entered promiscuous mode [ 1091.884629] bridge0: port 1(bridge_slave_0) entered blocking state [ 1091.907624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1091.922342] device bridge_slave_0 entered promiscuous mode [ 1091.931190] bridge0: port 2(bridge_slave_1) entered blocking state [ 1091.940450] bridge0: port 2(bridge_slave_1) entered disabled state [ 1091.947803] device bridge_slave_1 entered promiscuous mode [ 1091.956506] bridge0: port 1(bridge_slave_0) entered blocking state [ 1091.964570] bridge0: port 1(bridge_slave_0) entered disabled state [ 1091.978475] device bridge_slave_0 entered promiscuous mode [ 1092.009638] bridge0: port 2(bridge_slave_1) entered blocking state [ 1092.016257] bridge0: port 2(bridge_slave_1) entered disabled state [ 1092.038286] device bridge_slave_1 entered promiscuous mode [ 1092.047600] bridge0: port 2(bridge_slave_1) entered blocking state [ 1092.054032] bridge0: port 2(bridge_slave_1) entered disabled state [ 1092.078629] device bridge_slave_1 entered promiscuous mode [ 1092.092038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1092.101128] bridge0: port 1(bridge_slave_0) entered blocking state [ 1092.115468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1092.128126] device bridge_slave_0 entered promiscuous mode [ 1092.136430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1092.168933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1092.193816] bridge0: port 2(bridge_slave_1) entered blocking state [ 1092.206352] bridge0: port 2(bridge_slave_1) entered disabled state [ 1092.228314] device bridge_slave_1 entered promiscuous mode [ 1092.236778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1092.260908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1092.277223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1092.304699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1092.375913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1092.521736] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1092.540265] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1092.564502] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1092.622297] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1092.632954] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1092.645364] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1092.669360] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1092.739576] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1092.748221] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1092.755563] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1092.769079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1092.778770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1092.799267] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1092.840483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1093.096984] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1093.113176] team0: Port device team_slave_0 added [ 1093.144844] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1093.154401] team0: Port device team_slave_0 added [ 1093.162922] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1093.173383] team0: Port device team_slave_0 added [ 1093.181339] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1093.192423] team0: Port device team_slave_0 added [ 1093.238242] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1093.245728] team0: Port device team_slave_1 added [ 1093.254231] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1093.261949] team0: Port device team_slave_1 added [ 1093.292290] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1093.300020] team0: Port device team_slave_1 added [ 1093.306811] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1093.317744] team0: Port device team_slave_1 added [ 1093.332053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1093.358780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1093.405230] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1093.428709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1093.436427] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1093.453341] device bridge_slave_1 left promiscuous mode [ 1093.462095] bridge0: port 2(bridge_slave_1) entered disabled state [ 1093.518155] device bridge_slave_0 left promiscuous mode [ 1093.523598] bridge0: port 1(bridge_slave_0) entered disabled state [ 1093.568440] device bridge_slave_1 left promiscuous mode [ 1093.573915] bridge0: port 2(bridge_slave_1) entered disabled state [ 1093.628178] device bridge_slave_0 left promiscuous mode [ 1093.633596] bridge0: port 1(bridge_slave_0) entered disabled state [ 1093.708575] device bridge_slave_1 left promiscuous mode [ 1093.714113] bridge0: port 2(bridge_slave_1) entered disabled state [ 1093.758229] device bridge_slave_0 left promiscuous mode [ 1093.763669] bridge0: port 1(bridge_slave_0) entered disabled state [ 1093.880186] team0 (unregistering): Port device team_slave_1 removed [ 1093.890749] team0 (unregistering): Port device team_slave_0 removed [ 1093.900981] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1093.971717] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1094.025322] bond0 (unregistering): Released all slaves [ 1094.090676] team0 (unregistering): Port device team_slave_1 removed [ 1094.101384] team0 (unregistering): Port device team_slave_0 removed [ 1094.112415] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1094.151410] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1094.228635] bond0 (unregistering): Released all slaves [ 1094.290612] team0 (unregistering): Port device team_slave_1 removed [ 1094.301131] team0 (unregistering): Port device team_slave_0 removed [ 1094.310996] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1094.351144] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1094.405376] bond0 (unregistering): Released all slaves [ 1094.472465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1094.483293] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1094.491173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1094.507948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1094.516507] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1094.534677] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1094.535240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1094.555759] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1094.573611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1094.588643] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1094.608000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1094.616750] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1094.626171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1094.635460] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1094.657267] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1094.666270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1094.676280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1094.698151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1094.721302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1094.732391] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1094.762583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1094.779178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1094.798405] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1094.808862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1094.827977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1094.842149] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1094.858509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1094.872234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1094.962405] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1094.978018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1094.986298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1095.732247] bridge0: port 2(bridge_slave_1) entered blocking state [ 1095.738800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1095.745393] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.751775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1095.767652] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1095.844086] bridge0: port 2(bridge_slave_1) entered blocking state [ 1095.850594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1095.857236] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.863627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1095.878431] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1095.886669] bridge0: port 2(bridge_slave_1) entered blocking state [ 1095.893045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1095.899692] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.906059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1095.913771] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1096.099474] bridge0: port 2(bridge_slave_1) entered blocking state [ 1096.105860] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1096.112514] bridge0: port 1(bridge_slave_0) entered blocking state [ 1096.118882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1096.158908] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1096.497572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1096.518411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1096.536205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1096.550241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1099.025709] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1099.155160] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1099.165896] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1099.328490] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1099.394239] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1099.404463] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1099.471955] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1099.635219] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1099.646721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1099.655891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1099.670402] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1099.677672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1099.684711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1099.713749] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1099.758517] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1099.764739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1099.774023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1099.957165] 8021q: adding VLAN 0 to HW filter on device team0 [ 1099.975437] 8021q: adding VLAN 0 to HW filter on device team0 [ 1100.041448] 8021q: adding VLAN 0 to HW filter on device team0 [ 1100.050255] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1100.057608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1100.064614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1100.359360] 8021q: adding VLAN 0 to HW filter on device team0 [ 1101.708641] xt_check_target: 8 callbacks suppressed [ 1101.708657] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1101.996794] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1102.006443] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:51 executing program 5: semget$private(0x20000000, 0x4007, 0x0) 10:06:51 executing program 1: semget$private(0xf301000000000000, 0x4007, 0x0) 10:06:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:51 executing program 5: semget$private(0x1f03, 0x4007, 0x0) 10:06:51 executing program 0: semctl$GETALL(0x0, 0x15d, 0xd, &(0x7f00000000c0)=""/214) 10:06:51 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xab01, 0xd, &(0x7f00000000c0)=""/214) 10:06:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:51 executing program 0: semctl$GETALL(0x0, 0xed000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:51 executing program 1: semget$private(0xf0ffffff00000000, 0x4007, 0x0) 10:06:51 executing program 5: semget$private(0x44, 0x4007, 0x0) [ 1102.145091] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1102.156440] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:51 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc8, 0xd, &(0x7f00000000c0)=""/214) [ 1102.209217] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000feffff0700", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:51 executing program 0: semctl$GETALL(0x0, 0x7f00, 0xd, &(0x7f00000000c0)=""/214) 10:06:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:51 executing program 1: semget$private(0x1800000000000000, 0x4007, 0x0) 10:06:51 executing program 5: semget$private(0xfffffffffffffffe, 0x4007, 0x0) [ 1102.341193] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:51 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3300000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:51 executing program 0: semctl$GETALL(0x0, 0xed01, 0xd, &(0x7f00000000c0)=""/214) [ 1102.434435] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:51 executing program 0: semctl$GETALL(0x0, 0xb400, 0xd, &(0x7f00000000c0)=""/214) 10:06:51 executing program 5: semget$private(0x6, 0x4007, 0x0) 10:06:51 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xeb01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1102.516518] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1102.546671] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:51 executing program 0: semctl$GETALL(0x0, 0x9f00, 0xd, &(0x7f00000000c0)=""/214) 10:06:51 executing program 1: semget$private(0x62010000, 0x4007, 0x0) 10:06:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:51 executing program 5: semget$private(0x600000000000000, 0x4007, 0x0) [ 1102.637741] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1102.656723] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:51 executing program 0: semctl$GETALL(0x0, 0x78000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:51 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x40000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:52 executing program 1: semget$private(0x15000000, 0x4007, 0x0) [ 1102.818193] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1102.839329] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:52 executing program 0: semctl$GETALL(0x0, 0x70010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:52 executing program 5: semget$private(0x6000000, 0x4007, 0x0) 10:06:52 executing program 1: semget$private(0x13000000, 0x4007, 0x0) [ 1102.887586] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:52 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5, 0xd, &(0x7f00000000c0)=""/214) 10:06:52 executing program 5: semget$private(0xfffe, 0x4007, 0x0) 10:06:52 executing program 0: semctl$GETALL(0x0, 0x6a00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1103.038466] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1103.068020] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:52 executing program 1: semget$private(0x2000000, 0x4007, 0x0) 10:06:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:52 executing program 5: semget$private(0xb600, 0x4007, 0x0) [ 1103.169448] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000380100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:52 executing program 0: semctl$GETALL(0x0, 0xb0000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:52 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x107, 0xd, &(0x7f00000000c0)=""/214) [ 1103.251525] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:52 executing program 5: semget$private(0x2, 0x4007, 0x0) 10:06:52 executing program 1: semget$private(0xd00, 0x4007, 0x0) [ 1103.313057] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:52 executing program 0: semctl$GETALL(0x0, 0x4e010000, 0xd, &(0x7f00000000c0)=""/214) 10:06:52 executing program 1: semget$private(0x6001000000000000, 0x4007, 0x0) 10:06:52 executing program 5: semget$private(0x3, 0x4007, 0x0) [ 1103.483624] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1103.520964] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:52 executing program 0: semctl$GETALL(0x0, 0x130, 0xd, &(0x7f00000000c0)=""/214) [ 1103.564500] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:52 executing program 5: semget$private(0x1f030000, 0x4007, 0x0) 10:06:52 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa501000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:52 executing program 0: semctl$GETALL(0x0, 0xe501000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1103.680954] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1103.714931] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:52 executing program 5: semget$private(0x8000000000000000, 0x4007, 0x0) 10:06:52 executing program 0: semctl$GETALL(0x0, 0xb9, 0xd, &(0x7f00000000c0)=""/214) 10:06:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000400200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:53 executing program 1: semget$private(0x300000000000000, 0x4007, 0x0) [ 1103.867512] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1103.891456] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:06:53 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb5000000, 0xd, &(0x7f00000000c0)=""/214) 10:06:53 executing program 0: semctl$GETALL(0x0, 0xe2010000, 0xd, &(0x7f00000000c0)=""/214) [ 1103.926225] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:06:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:06:53 executing program 0: semctl$GETALL(0x0, 0x4f, 0xd, &(0x7f00000000c0)=""/214) 10:06:53 executing program 5: semget$private(0xa00000000000000, 0x4007, 0x0) 10:06:53 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8f00, 0xd, &(0x7f00000000c0)=""/214) 10:06:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:06:53 executing program 1: semget$private(0xdb00000000000000, 0x4007, 0x0) 10:06:53 executing program 1: semget$private(0xf2010000, 0x4007, 0x0) 10:06:53 executing program 1: semget$private(0x3000000, 0x4007, 0x0) 10:06:54 executing program 0: semctl$GETALL(0x0, 0x1de, 0xd, &(0x7f00000000c0)=""/214) 10:06:54 executing program 1: semget$private(0x40000000, 0x4007, 0x0) 10:06:54 executing program 1: semget$private(0xfe01, 0x4007, 0x0) 10:06:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1105.124611] IPVS: ftp: loaded support on port[0] = 21 [ 1105.243771] IPVS: ftp: loaded support on port[0] = 21 10:06:54 executing program 1: semget$private(0x3b00, 0x4007, 0x0) 10:06:54 executing program 5: semget$private(0x5000000, 0x4007, 0x0) 10:06:54 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1105.631021] IPVS: ftp: loaded support on port[0] = 21 [ 1105.644054] IPVS: ftp: loaded support on port[0] = 21 [ 1107.600987] bridge0: port 1(bridge_slave_0) entered blocking state [ 1107.647629] bridge0: port 1(bridge_slave_0) entered disabled state [ 1107.654861] device bridge_slave_0 entered promiscuous mode [ 1107.678539] bridge0: port 1(bridge_slave_0) entered blocking state [ 1107.684908] bridge0: port 1(bridge_slave_0) entered disabled state [ 1107.724251] device bridge_slave_0 entered promiscuous mode [ 1108.046435] bridge0: port 2(bridge_slave_1) entered blocking state [ 1108.052911] bridge0: port 2(bridge_slave_1) entered disabled state [ 1108.061751] device bridge_slave_1 entered promiscuous mode [ 1108.070892] bridge0: port 2(bridge_slave_1) entered blocking state [ 1108.077247] bridge0: port 2(bridge_slave_1) entered disabled state [ 1108.088727] device bridge_slave_1 entered promiscuous mode [ 1108.127221] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 10:06:57 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x136, 0xd, &(0x7f00000000c0)=""/214) 10:06:57 executing program 1: semget$private(0xfffe, 0x4007, 0x0) [ 1108.192885] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1108.228770] device bridge_slave_1 left promiscuous mode [ 1108.234332] bridge0: port 2(bridge_slave_1) entered disabled state 10:06:57 executing program 1: semget$private(0xf701, 0x4007, 0x0) [ 1108.289574] device bridge_slave_0 left promiscuous mode [ 1108.295087] bridge0: port 1(bridge_slave_0) entered disabled state 10:06:57 executing program 1: semget$private(0x160, 0x4007, 0x0) [ 1108.365459] IPVS: ftp: loaded support on port[0] = 21 10:06:57 executing program 1: semget$private(0x34, 0x4007, 0x0) [ 1108.408962] team0 (unregistering): Port device team_slave_1 removed [ 1108.421352] team0 (unregistering): Port device team_slave_0 removed [ 1108.433401] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1108.480512] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1108.518614] bond0 (unregistering): Released all slaves [ 1108.562112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1108.571567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1108.579012] bridge0: port 1(bridge_slave_0) entered disabled state [ 1108.586234] device bridge_slave_0 entered promiscuous mode [ 1108.596394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1108.603897] bridge0: port 1(bridge_slave_0) entered blocking state [ 1108.618910] bridge0: port 1(bridge_slave_0) entered disabled state [ 1108.632285] device bridge_slave_0 entered promiscuous mode [ 1108.670317] bridge0: port 2(bridge_slave_1) entered blocking state [ 1108.682974] bridge0: port 2(bridge_slave_1) entered disabled state [ 1108.697512] device bridge_slave_1 entered promiscuous mode [ 1108.759105] bridge0: port 2(bridge_slave_1) entered blocking state [ 1108.765505] bridge0: port 2(bridge_slave_1) entered disabled state [ 1108.778294] device bridge_slave_1 entered promiscuous mode [ 1108.810242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1108.923357] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1108.954681] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1108.967225] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1108.987890] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1109.043260] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1109.082198] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1109.118090] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1109.181295] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1109.198260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1109.229460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1109.237823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1109.317720] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1109.324690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1109.379492] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1109.399577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1109.406436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1109.464105] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1109.487538] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1109.585049] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1109.598407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1109.642823] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1109.721384] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1109.738419] team0: Port device team_slave_0 added [ 1109.757418] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1109.771269] team0: Port device team_slave_0 added [ 1109.871946] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1109.879519] team0: Port device team_slave_1 added [ 1109.903962] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1109.937925] team0: Port device team_slave_1 added [ 1109.982056] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1110.005286] team0: Port device team_slave_0 added [ 1110.060247] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1110.081470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1110.180590] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1110.211404] team0: Port device team_slave_1 added [ 1110.217547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1110.239769] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1110.246618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1110.270459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1110.290804] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1110.299097] team0: Port device team_slave_0 added [ 1110.307204] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1110.331090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1110.340873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1110.358747] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1110.367136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1110.397839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1110.405711] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1110.438250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1110.446163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1110.480339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1110.489122] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1110.501386] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1110.508634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1110.527783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1110.557640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1110.577870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1110.585692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1110.594149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1110.603906] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1110.611729] team0: Port device team_slave_1 added [ 1110.628848] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1110.643836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1110.658144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1110.737678] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1110.744877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1110.753670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1110.779657] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1110.787471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1110.795277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1110.835564] bridge0: port 1(bridge_slave_0) entered blocking state [ 1110.857546] bridge0: port 1(bridge_slave_0) entered disabled state [ 1110.865714] device bridge_slave_0 entered promiscuous mode [ 1110.907644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1110.914503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1110.927903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1111.000532] bridge0: port 2(bridge_slave_1) entered blocking state [ 1111.017446] bridge0: port 2(bridge_slave_1) entered disabled state [ 1111.024544] device bridge_slave_1 entered promiscuous mode [ 1111.054424] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1111.078602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1111.086517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1111.135824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1111.240697] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1111.247934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1111.255813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1111.265726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1111.628763] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1111.768741] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1111.880841] bridge0: port 2(bridge_slave_1) entered blocking state [ 1111.887240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1111.893917] bridge0: port 1(bridge_slave_0) entered blocking state [ 1111.900319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1111.916660] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1111.940277] bridge0: port 2(bridge_slave_1) entered blocking state [ 1111.946688] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1111.953370] bridge0: port 1(bridge_slave_0) entered blocking state [ 1111.959775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1111.978964] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1112.215809] bridge0: port 2(bridge_slave_1) entered blocking state [ 1112.222242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1112.229427] bridge0: port 1(bridge_slave_0) entered blocking state [ 1112.235779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1112.244396] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1112.264633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1112.273307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1112.287965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1112.365577] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1112.373390] team0: Port device team_slave_0 added [ 1112.470539] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1112.489307] team0: Port device team_slave_1 added [ 1112.525560] bridge0: port 2(bridge_slave_1) entered blocking state [ 1112.531974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1112.538648] bridge0: port 1(bridge_slave_0) entered blocking state [ 1112.545106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1112.584487] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1112.592852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1112.640855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1112.658112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1112.691332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1112.718086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1112.728639] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1112.794926] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1112.817730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1112.834006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1112.894385] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1112.958162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1112.966215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1113.059644] device bridge_slave_1 left promiscuous mode [ 1113.065198] bridge0: port 2(bridge_slave_1) entered disabled state [ 1113.148320] device bridge_slave_0 left promiscuous mode [ 1113.153856] bridge0: port 1(bridge_slave_0) entered disabled state [ 1113.188807] device bridge_slave_1 left promiscuous mode [ 1113.194255] bridge0: port 2(bridge_slave_1) entered disabled state [ 1113.228407] device bridge_slave_0 left promiscuous mode [ 1113.233862] bridge0: port 1(bridge_slave_0) entered disabled state [ 1113.288631] device bridge_slave_1 left promiscuous mode [ 1113.294061] bridge0: port 2(bridge_slave_1) entered disabled state [ 1113.338391] device bridge_slave_0 left promiscuous mode [ 1113.343911] bridge0: port 1(bridge_slave_0) entered disabled state [ 1113.398394] device bridge_slave_1 left promiscuous mode [ 1113.403832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1113.468302] device bridge_slave_0 left promiscuous mode [ 1113.473742] bridge0: port 1(bridge_slave_0) entered disabled state [ 1113.613781] team0 (unregistering): Port device team_slave_1 removed [ 1113.623096] team0 (unregistering): Port device team_slave_0 removed [ 1113.633324] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1113.671683] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1113.725516] bond0 (unregistering): Released all slaves [ 1113.790763] team0 (unregistering): Port device team_slave_1 removed [ 1113.800916] team0 (unregistering): Port device team_slave_0 removed [ 1113.810986] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1113.842214] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1113.916564] bond0 (unregistering): Released all slaves [ 1113.970403] team0 (unregistering): Port device team_slave_1 removed [ 1113.981005] team0 (unregistering): Port device team_slave_0 removed [ 1113.990816] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1114.020738] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1114.074920] bond0 (unregistering): Released all slaves [ 1114.130509] team0 (unregistering): Port device team_slave_1 removed [ 1114.141250] team0 (unregistering): Port device team_slave_0 removed [ 1114.151043] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1114.181080] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1114.235950] bond0 (unregistering): Released all slaves [ 1114.294889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1115.040606] bridge0: port 2(bridge_slave_1) entered blocking state [ 1115.047004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1115.053692] bridge0: port 1(bridge_slave_0) entered blocking state [ 1115.060050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1115.078220] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1115.297966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1117.528550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1117.715753] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1117.930561] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1118.090482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1118.167551] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1118.202252] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1118.334446] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1118.351497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1118.362282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1118.405478] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1118.606837] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1118.630020] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1118.636382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1118.644188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1118.748202] 8021q: adding VLAN 0 to HW filter on device team0 [ 1118.796294] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1118.806063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1118.816584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1118.948888] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1118.955036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1118.964192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1118.979142] 8021q: adding VLAN 0 to HW filter on device team0 [ 1119.117968] 8021q: adding VLAN 0 to HW filter on device team0 [ 1119.317957] 8021q: adding VLAN 0 to HW filter on device team0 [ 1119.367542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1119.708390] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1120.065678] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1120.087414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1120.096902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1120.506706] 8021q: adding VLAN 0 to HW filter on device team0 10:07:09 executing program 0: semctl$GETALL(0x0, 0x3500000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:09 executing program 1: semget$private(0xb00000000000000, 0x4007, 0x0) 10:07:10 executing program 0: semctl$GETALL(0x0, 0x1bd, 0xd, &(0x7f00000000c0)=""/214) [ 1121.016197] xt_check_target: 1 callbacks suppressed [ 1121.016211] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:10 executing program 1: semget$private(0x6101000000000000, 0x4007, 0x0) [ 1121.121109] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:10 executing program 5: semget$private(0xb6000000, 0x4007, 0x0) 10:07:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1121.328118] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1121.338028] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1121.363524] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:10 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc3, 0xd, &(0x7f00000000c0)=""/214) 10:07:10 executing program 0: semctl$GETALL(0x0, 0xe701000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:10 executing program 1: semget$private(0x400000000000000, 0x4007, 0x0) 10:07:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:10 executing program 5: semget$private(0x1800, 0x4007, 0x0) 10:07:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:10 executing program 0: semctl$GETALL(0x0, 0x8700, 0xd, &(0x7f00000000c0)=""/214) 10:07:10 executing program 5: semget$private(0x6600, 0x4007, 0x0) [ 1121.690853] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1121.706446] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1121.711634] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:10 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x173, 0xd, &(0x7f00000000c0)=""/214) 10:07:10 executing program 1: semget$private(0xfa010000, 0x4007, 0x0) 10:07:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:11 executing program 0: semctl$GETALL(0x0, 0x5c, 0xd, &(0x7f00000000c0)=""/214) [ 1121.842907] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:11 executing program 5: semget$private(0x4000, 0x4007, 0x0) 10:07:11 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x172, 0xd, &(0x7f00000000c0)=""/214) 10:07:11 executing program 1: semget$private(0x16000000, 0x4007, 0x0) 10:07:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:11 executing program 5: semget$private(0x30a, 0x4007, 0x0) 10:07:11 executing program 0: semctl$GETALL(0x0, 0x1b01, 0xd, &(0x7f00000000c0)=""/214) [ 1121.987883] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:11 executing program 1: semget$private(0x12000000, 0x4007, 0x0) 10:07:11 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:11 executing program 5: semget$private(0x500000000000000, 0x4007, 0x0) [ 1122.065423] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:11 executing program 1: semget$private(0x40000, 0x4007, 0x0) [ 1122.109906] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:11 executing program 0: semctl$GETALL(0x0, 0xf900, 0xd, &(0x7f00000000c0)=""/214) 10:07:11 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x27010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:11 executing program 5: semget$private(0x45000000, 0x4007, 0x0) [ 1122.160169] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:11 executing program 1: semget$private(0xf401, 0x4007, 0x0) 10:07:11 executing program 5: semget$private(0x500, 0x4007, 0x0) 10:07:11 executing program 1: semget$private(0xc00, 0x4007, 0x0) 10:07:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1122.292853] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:11 executing program 0: semctl$GETALL(0x0, 0xb6010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:11 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x19a, 0xd, &(0x7f00000000c0)=""/214) 10:07:11 executing program 5: semget$private(0xd402, 0x4007, 0x0) [ 1122.345736] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1122.369009] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:11 executing program 1: semget$private(0x300, 0x4007, 0x0) 10:07:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:11 executing program 1: semget$private(0xffffffffffffffff, 0x4007, 0x0) [ 1122.456297] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:11 executing program 5: semget$private(0x320, 0x4007, 0x0) 10:07:11 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x50, 0xd, &(0x7f00000000c0)=""/214) 10:07:11 executing program 0: semctl$GETALL(0x0, 0x52010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:11 executing program 5: semget$private(0x2db, 0x4007, 0x0) [ 1122.499207] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1122.524080] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:11 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x16d, 0xd, &(0x7f00000000c0)=""/214) 10:07:11 executing program 1: semget$private(0xfa01000000000000, 0x4007, 0x0) 10:07:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:11 executing program 0: semctl$GETALL(0x0, 0x7a000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:11 executing program 5: semget$private(0xfe, 0x4007, 0x0) 10:07:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:11 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8c00000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1122.680771] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1122.695574] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:11 executing program 1: semget$private(0xdd000000, 0x4007, 0x0) 10:07:11 executing program 0: semctl$GETALL(0x0, 0x48010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000feffff0700", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1122.775058] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:12 executing program 5: semget$private(0x40000, 0x4007, 0x0) 10:07:12 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa400, 0xd, &(0x7f00000000c0)=""/214) 10:07:12 executing program 1: semget$private(0x3600, 0x4007, 0x0) 10:07:12 executing program 0: semctl$GETALL(0x0, 0x6100000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1122.865944] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1122.899475] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:12 executing program 5: semget$private(0x3f000000, 0x4007, 0x0) 10:07:12 executing program 1: semget$private(0x1600, 0x4007, 0x0) 10:07:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:12 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xe010000, 0xd, &(0x7f00000000c0)=""/214) [ 1122.940047] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:12 executing program 0: semctl$GETALL(0x0, 0x19000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:12 executing program 5: semget$private(0x2000000000000000, 0x4007, 0x0) 10:07:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000ffffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:12 executing program 1: semget$private(0x4000, 0x4007, 0x0) 10:07:12 executing program 0: semctl$GETALL(0x0, 0x3a010000, 0xd, &(0x7f00000000c0)=""/214) [ 1123.061155] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1123.085559] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:12 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa, 0xd, &(0x7f00000000c0)=""/214) 10:07:12 executing program 5: semget$private(0x20030000, 0x4007, 0x0) 10:07:12 executing program 1: semget$private(0x18, 0x4007, 0x0) 10:07:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:12 executing program 0: semctl$GETALL(0x0, 0x7201, 0xd, &(0x7f00000000c0)=""/214) 10:07:12 executing program 1: semget$private(0x6201000000000000, 0x4007, 0x0) 10:07:12 executing program 5: semget$private(0x67, 0x4007, 0x0) 10:07:12 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x48, 0xd, &(0x7f00000000c0)=""/214) [ 1123.277548] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:12 executing program 1: semget$private(0xf001000000000000, 0x4007, 0x0) [ 1123.335293] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:12 executing program 0: semctl$GETALL(0x0, 0x8800, 0xd, &(0x7f00000000c0)=""/214) 10:07:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:12 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd600000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:12 executing program 5: semget$private(0x4000000000000, 0x4007, 0x0) 10:07:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:12 executing program 0: semctl$GETALL(0x0, 0x1dc, 0xd, &(0x7f00000000c0)=""/214) 10:07:12 executing program 1: semget$private(0xdb000000, 0x4007, 0x0) 10:07:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1123.513396] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:12 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6d000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:12 executing program 5: semget$private(0x44000000, 0x4007, 0x0) 10:07:12 executing program 1: semget$private(0xf4010000, 0x4007, 0x0) 10:07:12 executing program 0: semctl$GETALL(0x0, 0xa6, 0xd, &(0x7f00000000c0)=""/214) [ 1123.597253] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:12 executing program 1: semget$private(0x1400, 0x4007, 0x0) 10:07:12 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9a00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:12 executing program 5: semget$private(0x4000000, 0x4007, 0x0) 10:07:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:12 executing program 0: semctl$GETALL(0x0, 0x12e, 0xd, &(0x7f00000000c0)=""/214) 10:07:12 executing program 1: semget$private(0x34000000, 0x4007, 0x0) [ 1123.741141] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:13 executing program 5: semget$private(0xffffffffffffffff, 0x4007, 0x0) 10:07:13 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x33000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:13 executing program 1: semget$private(0x3400, 0x4007, 0x0) [ 1123.851523] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:13 executing program 0: semctl$GETALL(0x0, 0x134, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 5: semget$private(0xd2, 0x4007, 0x0) 10:07:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:13 executing program 1: semget$private(0xd9, 0x4007, 0x0) [ 1123.972550] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:13 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:13 executing program 5: semget$private(0xd100000000000000, 0x4007, 0x0) 10:07:13 executing program 0: semctl$GETALL(0x0, 0x1601000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 1: semget$private(0x1fd, 0x4007, 0x0) 10:07:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1124.110245] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1124.148976] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:13 executing program 5: semget$private(0x3f00000000000000, 0x4007, 0x0) 10:07:13 executing program 0: semctl$GETALL(0x0, 0x12000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xcd00, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 1: semget$private(0x800000000000000, 0x4007, 0x0) 10:07:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1124.213376] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:13 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6d01, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1124.325039] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:13 executing program 5: semget$private(0x4400, 0x4007, 0x0) 10:07:13 executing program 0: semctl$GETALL(0x0, 0x1e000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:13 executing program 1: semget$private(0xdd00000000000000, 0x4007, 0x0) [ 1124.400395] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:13 executing program 1: semget$private(0xfe010000, 0x4007, 0x0) 10:07:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:13 executing program 5: semget$private(0x42, 0x4007, 0x0) 10:07:13 executing program 0: semctl$GETALL(0x0, 0x177, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf201, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:13 executing program 1: semget$private(0x18000000, 0x4007, 0x0) [ 1124.598259] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:13 executing program 5: semget$private(0x2d4, 0x4007, 0x0) 10:07:13 executing program 0: semctl$GETALL(0x0, 0x1b2, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xeb00, 0xd, &(0x7f00000000c0)=""/214) [ 1124.643262] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:13 executing program 5: semget$private(0xd402000000000000, 0x4007, 0x0) 10:07:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:13 executing program 0: semctl$GETALL(0x0, 0x90010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:13 executing program 1: semget$private(0xdc00, 0x4007, 0x0) 10:07:14 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x35010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000ffffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:14 executing program 0: semctl$GETALL(0x0, 0x154, 0xd, &(0x7f00000000c0)=""/214) [ 1124.779565] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:14 executing program 5: semget$private(0xd300, 0x4007, 0x0) 10:07:14 executing program 1: semget$private(0xd900, 0x4007, 0x0) 10:07:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:14 executing program 0: semctl$GETALL(0x0, 0x8a000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1124.912650] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:14 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xfb010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:14 executing program 1: semget$private(0xb00, 0x4007, 0x0) 10:07:14 executing program 5: semget$private(0x4500, 0x4007, 0x0) 10:07:14 executing program 1: semget$private(0xe00, 0x4007, 0x0) [ 1125.021009] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:14 executing program 0: semctl$GETALL(0x0, 0xbd010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:14 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x2e00, 0xd, &(0x7f00000000c0)=""/214) 10:07:14 executing program 5: semget$private(0x600, 0x4007, 0x0) 10:07:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:14 executing program 1: semget$private(0x17, 0x4007, 0x0) 10:07:14 executing program 0: semctl$GETALL(0x0, 0x6800, 0xd, &(0x7f00000000c0)=""/214) [ 1125.179805] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:14 executing program 5: semget$private(0xd3, 0x4007, 0x0) 10:07:14 executing program 0: semctl$GETALL(0x0, 0x6f00, 0xd, &(0x7f00000000c0)=""/214) 10:07:14 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x89, 0xd, &(0x7f00000000c0)=""/214) 10:07:14 executing program 1: semget$private(0xf, 0x4007, 0x0) 10:07:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:14 executing program 5: semget$private(0x4300000000000000, 0x4007, 0x0) 10:07:14 executing program 0: semctl$GETALL(0x0, 0xef01, 0xd, &(0x7f00000000c0)=""/214) 10:07:14 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x60, 0xd, &(0x7f00000000c0)=""/214) 10:07:14 executing program 1: semget$private(0x36000000, 0x4007, 0x0) 10:07:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:14 executing program 5: semget$private(0x40000000, 0x4007, 0x0) 10:07:15 executing program 0: semctl$GETALL(0x0, 0x3c, 0xd, &(0x7f00000000c0)=""/214) 10:07:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:15 executing program 1: semget$private(0xd000000, 0x4007, 0x0) 10:07:15 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3800000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:15 executing program 5: semget$private(0x42000000, 0x4007, 0x0) 10:07:15 executing program 0: semctl$GETALL(0x0, 0x5001000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:15 executing program 1: semget$private(0xa000000, 0x4007, 0x0) 10:07:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:15 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xff010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:15 executing program 5: semget$private(0x300, 0x4007, 0x0) 10:07:15 executing program 0: semctl$GETALL(0x0, 0x7e010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:15 executing program 1: semget$private(0xfeffffff, 0x4007, 0x0) [ 1126.044325] xt_check_target: 22 callbacks suppressed [ 1126.044339] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1126.138715] IPVS: ftp: loaded support on port[0] = 21 [ 1126.347969] device bridge_slave_1 left promiscuous mode [ 1126.353556] bridge0: port 2(bridge_slave_1) entered disabled state [ 1126.398188] device bridge_slave_0 left promiscuous mode [ 1126.403617] bridge0: port 1(bridge_slave_0) entered disabled state [ 1126.466372] team0 (unregistering): Port device team_slave_1 removed [ 1126.476611] team0 (unregistering): Port device team_slave_0 removed [ 1126.486694] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1126.512795] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1126.574929] bond0 (unregistering): Released all slaves [ 1126.900950] bridge0: port 1(bridge_slave_0) entered blocking state [ 1126.907621] bridge0: port 1(bridge_slave_0) entered disabled state [ 1126.914931] device bridge_slave_0 entered promiscuous mode [ 1126.953388] bridge0: port 2(bridge_slave_1) entered blocking state [ 1126.959989] bridge0: port 2(bridge_slave_1) entered disabled state [ 1126.967134] device bridge_slave_1 entered promiscuous mode [ 1127.004155] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1127.041437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1127.154263] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1127.194698] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1127.376891] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1127.384252] team0: Port device team_slave_0 added [ 1127.420228] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1127.427801] team0: Port device team_slave_1 added [ 1127.465583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1127.503581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1127.543362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1127.583499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1127.909687] bridge0: port 2(bridge_slave_1) entered blocking state [ 1127.916044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1127.922843] bridge0: port 1(bridge_slave_0) entered blocking state [ 1127.929200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1127.936229] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1128.816427] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1128.899783] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1128.907765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1128.988343] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1128.994503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1129.002065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1129.084457] 8021q: adding VLAN 0 to HW filter on device team0 10:07:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:18 executing program 5: semget$private(0x2003, 0x4007, 0x0) 10:07:18 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6b010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:18 executing program 1: semget$private(0x163, 0x4007, 0x0) 10:07:18 executing program 0: semctl$GETALL(0x0, 0x86000000, 0xd, &(0x7f00000000c0)=""/214) [ 1129.635484] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1129.644477] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:18 executing program 1: semget$private(0x3a, 0x4007, 0x0) 10:07:18 executing program 5: semget$private(0xda, 0x4007, 0x0) 10:07:18 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6f, 0xd, &(0x7f00000000c0)=""/214) [ 1129.718771] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:18 executing program 0: semctl$GETALL(0x0, 0x6601, 0xd, &(0x7f00000000c0)=""/214) 10:07:18 executing program 5: semget$private(0x4200000000000000, 0x4007, 0x0) 10:07:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x14f, 0xd, &(0x7f00000000c0)=""/214) [ 1129.769057] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1129.808066] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:19 executing program 1: semget$private(0x61010000, 0x4007, 0x0) 10:07:19 executing program 0: semctl$GETALL(0x0, 0x9a01, 0xd, &(0x7f00000000c0)=""/214) 10:07:19 executing program 5: semget$private(0x803, 0x4007, 0x0) 10:07:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xbe, 0xd, &(0x7f00000000c0)=""/214) [ 1129.935180] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1129.946282] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000feffff0700", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:19 executing program 1: semget$private(0x3a00, 0x4007, 0x0) 10:07:19 executing program 0: semctl$GETALL(0x0, 0x8, 0xd, &(0x7f00000000c0)=""/214) 10:07:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1eb, 0xd, &(0x7f00000000c0)=""/214) 10:07:19 executing program 5: semget$private(0x4300, 0x4007, 0x0) 10:07:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:19 executing program 1: semget$private(0xda, 0x4007, 0x0) [ 1130.081058] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:19 executing program 0: semctl$GETALL(0x0, 0x7c01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x12b, 0xd, &(0x7f00000000c0)=""/214) 10:07:19 executing program 1: semget$private(0x12, 0x4007, 0x0) [ 1130.139165] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1130.166164] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:19 executing program 5: semget$private(0xfeffffffffffffff, 0x4007, 0x0) 10:07:19 executing program 0: semctl$GETALL(0x0, 0xd4010000, 0xd, &(0x7f00000000c0)=""/214) [ 1130.239106] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:19 executing program 5: semget$private(0x2503, 0x4007, 0x0) 10:07:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:19 executing program 1: semget$private(0x1500000000000000, 0x4007, 0x0) 10:07:19 executing program 0: semctl$GETALL(0x0, 0x88000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3201000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1130.366295] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:19 executing program 5: semget$private(0xd300000000000000, 0x4007, 0x0) [ 1130.423309] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:19 executing program 0: semctl$GETALL(0x0, 0x4f01, 0xd, &(0x7f00000000c0)=""/214) 10:07:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x69010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:19 executing program 1: semget$private(0xfd010000, 0x4007, 0x0) [ 1130.488253] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1130.524316] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:19 executing program 5: semget$private(0x1800000000000000, 0x4007, 0x0) 10:07:19 executing program 0: semctl$GETALL(0x0, 0xa900000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:19 executing program 1: semget$private(0x4000000, 0x4007, 0x0) 10:07:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa5000000, 0xd, &(0x7f00000000c0)=""/214) [ 1130.605200] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1130.651566] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:19 executing program 5: semget$private(0xb600000000000000, 0x4007, 0x0) 10:07:19 executing program 1: semget$private(0x900, 0x4007, 0x0) 10:07:19 executing program 0: semctl$GETALL(0x0, 0x4201000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1130.702636] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5b01, 0xd, &(0x7f00000000c0)=""/214) 10:07:19 executing program 0: semctl$GETALL(0x0, 0x5b010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:19 executing program 5: semget$private(0xd200000000000000, 0x4007, 0x0) 10:07:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1130.775606] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:20 executing program 1: semget$private(0x3b00000000000000, 0x4007, 0x0) 10:07:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x112, 0xd, &(0x7f00000000c0)=""/214) 10:07:20 executing program 5: semget$private(0xa030000, 0x4007, 0x0) [ 1130.869525] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1130.894876] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:20 executing program 0: semctl$GETALL(0x0, 0xcb00, 0xd, &(0x7f00000000c0)=""/214) 10:07:20 executing program 1: semget$private(0x200000000000000, 0x4007, 0x0) 10:07:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x70, 0xd, &(0x7f00000000c0)=""/214) 10:07:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:20 executing program 0: semctl$GETALL(0x0, 0xdb00, 0xd, &(0x7f00000000c0)=""/214) 10:07:20 executing program 5: semget$private(0x308, 0x4007, 0x0) [ 1131.032847] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1131.061175] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:20 executing program 1: semget$private(0x3b, 0x4007, 0x0) 10:07:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x24, 0xd, &(0x7f00000000c0)=""/214) 10:07:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1131.148638] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:20 executing program 0: semctl$GETALL(0x0, 0x2, 0xd, &(0x7f00000000c0)=""/214) 10:07:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9501000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:20 executing program 5: semget$private(0x45, 0x4007, 0x0) 10:07:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:20 executing program 1: semget$private(0xe, 0x4007, 0x0) 10:07:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1131.276331] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1131.293350] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:20 executing program 0: semctl$GETALL(0x0, 0x6e, 0xd, &(0x7f00000000c0)=""/214) 10:07:20 executing program 5: semget$private(0x4, 0x4007, 0x0) 10:07:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xac010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:20 executing program 1: semget$private(0xde, 0x4007, 0x0) [ 1131.402209] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:20 executing program 5: semget$private(0xf00000000000000, 0x4007, 0x0) 10:07:20 executing program 0: semctl$GETALL(0x0, 0xc300, 0xd, &(0x7f00000000c0)=""/214) [ 1131.448070] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:20 executing program 1: semget$private(0x35, 0x4007, 0x0) 10:07:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5d000000, 0xd, &(0x7f00000000c0)=""/214) [ 1131.491282] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:20 executing program 5: semget$private(0x2103, 0x4007, 0x0) 10:07:20 executing program 0: semctl$GETALL(0x0, 0x90, 0xd, &(0x7f00000000c0)=""/214) 10:07:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xe401, 0xd, &(0x7f00000000c0)=""/214) 10:07:20 executing program 1: semget$private(0xda00000000000000, 0x4007, 0x0) [ 1131.602120] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1131.621486] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1131.676188] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:20 executing program 5: semget$private(0x2503000000000000, 0x4007, 0x0) 10:07:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:20 executing program 0: semctl$GETALL(0x0, 0x90000000, 0xd, &(0x7f00000000c0)=""/214) [ 1131.727952] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:20 executing program 1: semget$private(0xd900000000000000, 0x4007, 0x0) 10:07:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xfc000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1131.781585] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1131.811694] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:21 executing program 5: semget$private(0xd4020000, 0x4007, 0x0) 10:07:21 executing program 1: semget$private(0xf701000000000000, 0x4007, 0x0) 10:07:21 executing program 0: semctl$GETALL(0x0, 0x63010000, 0xd, &(0x7f00000000c0)=""/214) [ 1131.881327] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1131.893306] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:21 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc9000000, 0xd, &(0x7f00000000c0)=""/214) [ 1131.941685] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:21 executing program 0: semctl$GETALL(0x0, 0xd800, 0xd, &(0x7f00000000c0)=""/214) 10:07:21 executing program 5: semget$private(0x100000000000000, 0x4007, 0x0) 10:07:21 executing program 1: semget$private(0xda000000, 0x4007, 0x0) [ 1132.110198] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:21 executing program 0: semctl$GETALL(0x0, 0x6701, 0xd, &(0x7f00000000c0)=""/214) 10:07:21 executing program 1: semget$private(0x60010000, 0x4007, 0x0) 10:07:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:21 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xfd010000, 0xd, &(0x7f00000000c0)=""/214) [ 1132.151701] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1132.188716] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:21 executing program 5: semget$private(0x3000000, 0x4007, 0x0) 10:07:21 executing program 1: semget$private(0xde00, 0x4007, 0x0) 10:07:21 executing program 0: semctl$GETALL(0x0, 0x55, 0xd, &(0x7f00000000c0)=""/214) [ 1132.287126] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:21 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4000, 0xd, &(0x7f00000000c0)=""/214) 10:07:21 executing program 1: semget$private(0x900000000000000, 0x4007, 0x0) 10:07:21 executing program 0: semctl$GETALL(0x0, 0xbb00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1132.352560] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:21 executing program 5: semget$private(0x6700, 0x4007, 0x0) 10:07:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:21 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb500, 0xd, &(0x7f00000000c0)=""/214) 10:07:21 executing program 0: semctl$GETALL(0x0, 0x1e0, 0xd, &(0x7f00000000c0)=""/214) 10:07:21 executing program 5: semget$private(0x325, 0x4007, 0x0) 10:07:21 executing program 1: semget$private(0xd00000000000000, 0x4007, 0x0) [ 1132.506826] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1132.541705] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:21 executing program 0: semctl$GETALL(0x0, 0xd301000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:21 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xac01, 0xd, &(0x7f00000000c0)=""/214) 10:07:21 executing program 5: semget$private(0x2003000000000000, 0x4007, 0x0) 10:07:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1132.632985] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:21 executing program 1: semget$private(0x162, 0x4007, 0x0) 10:07:21 executing program 0: semctl$GETALL(0x0, 0x3d000000, 0xd, &(0x7f00000000c0)=""/214) [ 1132.700131] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:21 executing program 5: semget$private(0xd1000000, 0x4007, 0x0) 10:07:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:21 executing program 1: semget$private(0x3, 0x4007, 0x0) 10:07:21 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x16c, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 0: semctl$GETALL(0x0, 0x5d01, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:22 executing program 5: semget$private(0xda000000, 0x4007, 0x0) 10:07:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1132.838769] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:22 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb000000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 1: semget$private(0x15, 0x4007, 0x0) 10:07:22 executing program 5: semget$private(0xd2000000, 0x4007, 0x0) 10:07:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000feffff0700", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1132.947746] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:22 executing program 0: semctl$GETALL(0x0, 0x42, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:22 executing program 1: semget$private(0x9, 0x4007, 0x0) 10:07:22 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf8010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 5: semget$private(0xa00, 0x4007, 0x0) 10:07:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:22 executing program 0: semctl$GETALL(0x0, 0x3d, 0xd, &(0x7f00000000c0)=""/214) [ 1133.093047] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:22 executing program 1: semget$private(0x1200000000000000, 0x4007, 0x0) 10:07:22 executing program 5: semget$private(0xf, 0x4007, 0x0) 10:07:22 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc7010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:22 executing program 0: semctl$GETALL(0x0, 0xbf00, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 5: semget$private(0xd1, 0x4007, 0x0) 10:07:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:22 executing program 0: semctl$GETALL(0x0, 0x4001, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 1: semget$private(0x3400000000000000, 0x4007, 0x0) 10:07:22 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x2400, 0xd, &(0x7f00000000c0)=""/214) [ 1133.328649] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:22 executing program 5: semget$private(0xda00000000000000, 0x4007, 0x0) 10:07:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:22 executing program 0: semctl$GETALL(0x0, 0xe001000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 1: semget$private(0x8000000, 0x4007, 0x0) 10:07:22 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1b, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:22 executing program 5: semget$private(0x1f03000000000000, 0x4007, 0x0) [ 1133.520746] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:22 executing program 1: semget$private(0x14000000, 0x4007, 0x0) 10:07:22 executing program 0: semctl$GETALL(0x0, 0xce01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:22 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1e, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 1: semget$private(0x20000000, 0x4007, 0x0) 10:07:22 executing program 0: semctl$GETALL(0x0, 0x2100, 0xd, &(0x7f00000000c0)=""/214) 10:07:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:22 executing program 5: semget$private(0xdb02000000000000, 0x4007, 0x0) 10:07:23 executing program 1: semget$private(0xdd00, 0x4007, 0x0) 10:07:23 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3701000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:23 executing program 0: semctl$GETALL(0x0, 0xd900, 0xd, &(0x7f00000000c0)=""/214) 10:07:23 executing program 1: semget$private(0xa00, 0x4007, 0x0) 10:07:23 executing program 5: semget$private(0xdb020000, 0x4007, 0x0) 10:07:23 executing program 5: semget$private(0x3f00, 0x4007, 0x0) 10:07:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:23 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb7010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:23 executing program 0: semctl$GETALL(0x0, 0x1001000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:23 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:23 executing program 1: semget$private(0x1500, 0x4007, 0x0) 10:07:23 executing program 5: semget$private(0xfeff, 0x4007, 0x0) 10:07:23 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xbc010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:23 executing program 0: semctl$GETALL(0x0, 0x5a010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:23 executing program 1: semget$private(0xdb, 0x4007, 0x0) 10:07:23 executing program 0: semctl$GETALL(0x0, 0x7b00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:23 executing program 5: semget$private(0x66, 0x4007, 0x0) [ 1134.615128] IPVS: ftp: loaded support on port[0] = 21 [ 1134.797921] device bridge_slave_1 left promiscuous mode [ 1134.804900] bridge0: port 2(bridge_slave_1) entered disabled state [ 1134.848137] device bridge_slave_0 left promiscuous mode [ 1134.853580] bridge0: port 1(bridge_slave_0) entered disabled state [ 1134.936825] team0 (unregistering): Port device team_slave_1 removed [ 1134.946229] team0 (unregistering): Port device team_slave_0 removed [ 1134.956385] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1135.001436] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1135.065910] bond0 (unregistering): Released all slaves [ 1135.554560] bridge0: port 1(bridge_slave_0) entered blocking state [ 1135.561522] bridge0: port 1(bridge_slave_0) entered disabled state [ 1135.570554] device bridge_slave_0 entered promiscuous mode [ 1135.614708] bridge0: port 2(bridge_slave_1) entered blocking state [ 1135.621620] bridge0: port 2(bridge_slave_1) entered disabled state [ 1135.629684] device bridge_slave_1 entered promiscuous mode [ 1135.670910] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1135.711159] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1135.831373] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1135.874392] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1136.053064] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1136.060402] team0: Port device team_slave_0 added [ 1136.098630] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1136.105978] team0: Port device team_slave_1 added [ 1136.146882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1136.182826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1136.209889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1136.240912] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1136.248357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1136.256102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1136.555858] bridge0: port 2(bridge_slave_1) entered blocking state [ 1136.562335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1136.569007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1136.575361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1136.582916] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1137.297879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1137.446666] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1137.528668] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1137.609534] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1137.615677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1137.623096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1137.703009] 8021q: adding VLAN 0 to HW filter on device team0 10:07:27 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:27 executing program 1: semget$private(0x2, 0x4007, 0x0) 10:07:27 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x91, 0xd, &(0x7f00000000c0)=""/214) 10:07:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:27 executing program 5: semget$private(0x31f, 0x4007, 0x0) 10:07:27 executing program 0: semctl$GETALL(0x0, 0x3b01, 0xd, &(0x7f00000000c0)=""/214) 10:07:27 executing program 5: semget$private(0x803000000000000, 0x4007, 0x0) [ 1138.203144] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1138.230798] xt_check_target: 10 callbacks suppressed [ 1138.230814] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:27 executing program 0: semctl$GETALL(0x0, 0xf001000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:27 executing program 1: semget$private(0x4, 0x4007, 0x0) 10:07:27 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xae, 0xd, &(0x7f00000000c0)=""/214) [ 1138.307537] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1138.340865] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:27 executing program 5: semget$private(0x43000000, 0x4007, 0x0) 10:07:27 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:27 executing program 0: semctl$GETALL(0x0, 0x9101000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:27 executing program 1: semget$private(0x500000000000000, 0x4007, 0x0) [ 1138.394484] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:27 executing program 5: semget$private(0xd100, 0x4007, 0x0) 10:07:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:27 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xef01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:27 executing program 0: semctl$GETALL(0x0, 0x4800000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:27 executing program 1: semget$private(0x700000000000000, 0x4007, 0x0) [ 1138.545842] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1138.546377] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:27 executing program 5: semget$private(0x43, 0x4007, 0x0) 10:07:27 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:27 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xe6010000, 0xd, &(0x7f00000000c0)=""/214) [ 1138.595069] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:27 executing program 0: semctl$GETALL(0x0, 0x13a, 0xd, &(0x7f00000000c0)=""/214) 10:07:27 executing program 1: semget$private(0xde00000000000000, 0x4007, 0x0) 10:07:27 executing program 5: semget$private(0x321, 0x4007, 0x0) [ 1138.696316] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:27 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x75000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:27 executing program 0: semctl$GETALL(0x0, 0x3700000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:27 executing program 5: semget$private(0xb6, 0x4007, 0x0) [ 1138.754775] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:28 executing program 1: semget$private(0xb, 0x4007, 0x0) 10:07:28 executing program 0: semctl$GETALL(0x0, 0x8d00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:28 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa1000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:28 executing program 5: semget$private(0x4400000000000000, 0x4007, 0x0) [ 1138.870846] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1138.883206] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:28 executing program 1: semget$private(0xdc, 0x4007, 0x0) 10:07:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:28 executing program 0: semctl$GETALL(0x0, 0x6d00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:28 executing program 5: semget$private(0xfffffffe, 0x4007, 0x0) [ 1138.995751] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1139.026685] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:28 executing program 1: semget$private(0x1fe, 0x4007, 0x0) 10:07:28 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9000, 0xd, &(0x7f00000000c0)=""/214) [ 1139.042940] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:28 executing program 5: semget$private(0x5, 0x4007, 0x0) 10:07:28 executing program 0: semctl$GETALL(0x0, 0x2001, 0xd, &(0x7f00000000c0)=""/214) 10:07:28 executing program 1: semget$private(0xf201000000000000, 0x4007, 0x0) 10:07:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000ffffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1139.138701] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:28 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x16b, 0xd, &(0x7f00000000c0)=""/214) 10:07:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000ffffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:28 executing program 1: semget$private(0x2000000000000000, 0x4007, 0x0) 10:07:28 executing program 5: semget$private(0x200000000000000, 0x4007, 0x0) 10:07:28 executing program 0: semctl$GETALL(0x0, 0x19f, 0xd, &(0x7f00000000c0)=""/214) [ 1139.271239] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1139.295202] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:28 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6101000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:28 executing program 0: semctl$GETALL(0x0, 0x155, 0xd, &(0x7f00000000c0)=""/214) 10:07:28 executing program 1: semget$private(0x1700000000000000, 0x4007, 0x0) 10:07:28 executing program 5: semget$private(0x18, 0x4007, 0x0) [ 1139.339606] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:28 executing program 0: semctl$GETALL(0x0, 0x7d00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:28 executing program 1: semget$private(0xde000000, 0x4007, 0x0) 10:07:28 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xe300000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:28 executing program 5: semget$private(0x0, 0x7d00, 0x0) [ 1139.492667] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:28 executing program 0: semctl$GETALL(0x0, 0x59010000, 0xd, &(0x7f00000000c0)=""/214) [ 1139.535371] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:28 executing program 1: semget$private(0xfeffffffffffffff, 0x4007, 0x0) 10:07:28 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x2010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:28 executing program 0: semctl$GETALL(0x0, 0xb8000000, 0xd, &(0x7f00000000c0)=""/214) [ 1139.585977] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:28 executing program 5: semget$private(0x0, 0xfffffd, 0x0) 10:07:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1139.666969] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:28 executing program 1: semget$private(0xd9000000, 0x4007, 0x0) 10:07:28 executing program 0: semctl$GETALL(0x0, 0x5e01, 0xd, &(0x7f00000000c0)=""/214) 10:07:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:28 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa4000000, 0xd, &(0x7f00000000c0)=""/214) [ 1139.715000] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000400200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:28 executing program 5: semget$private(0x0, 0x4008, 0x0) 10:07:29 executing program 1: semget$private(0x6201, 0x4007, 0x0) 10:07:29 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb5, 0xd, &(0x7f00000000c0)=""/214) 10:07:29 executing program 0: semctl$GETALL(0x0, 0xdb01, 0xd, &(0x7f00000000c0)=""/214) [ 1139.839784] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1139.861544] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:29 executing program 5: semget$private(0x0, 0x4006, 0x0) 10:07:29 executing program 1: semget$private(0xfd01, 0x4007, 0x0) 10:07:29 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1f0, 0xd, &(0x7f00000000c0)=""/214) 10:07:29 executing program 0: semctl$GETALL(0x0, 0x4, 0xd, &(0x7f00000000c0)=""/214) [ 1139.986552] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:29 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3b, 0xd, &(0x7f00000000c0)=""/214) 10:07:29 executing program 1: semget$private(0x16, 0x4007, 0x0) 10:07:29 executing program 5: semget$private(0x0, 0x4007, 0x2d4) 10:07:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:29 executing program 0: semctl$GETALL(0x0, 0xb, 0xd, &(0x7f00000000c0)=""/214) [ 1140.095243] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1140.128568] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:29 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xca000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:29 executing program 5: semget$private(0x0, 0x4007, 0x40000) 10:07:29 executing program 1: semget$private(0x7, 0x4007, 0x0) 10:07:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:29 executing program 0: semctl$GETALL(0x0, 0x7c00000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1140.251431] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:29 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8100000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:29 executing program 1: semget$private(0x1f7, 0x4007, 0x0) 10:07:29 executing program 5: semget$private(0x0, 0x4007, 0xd300) [ 1140.303991] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:29 executing program 5: semget$private(0x0, 0x4007, 0xd200) 10:07:29 executing program 1: semget$private(0x4000000000000, 0x4007, 0x0) 10:07:29 executing program 0: semctl$GETALL(0x0, 0xa701, 0xd, &(0x7f00000000c0)=""/214) 10:07:29 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8701000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1140.479345] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:29 executing program 5: semget$private(0x0, 0x4007, 0xfeff) 10:07:29 executing program 0: semctl$GETALL(0x0, 0x2a, 0xd, &(0x7f00000000c0)=""/214) 10:07:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:29 executing program 1: semget$private(0x39000000, 0x4007, 0x0) 10:07:29 executing program 0: semctl$GETALL(0x0, 0xd0010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1140.615326] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:29 executing program 1: semget$private(0x3500, 0x4007, 0x0) 10:07:29 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x2201000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:29 executing program 5: semget$private(0x0, 0x4007, 0xa03000000000000) 10:07:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1140.665349] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:29 executing program 0: semctl$GETALL(0x0, 0xc500, 0xd, &(0x7f00000000c0)=""/214) 10:07:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000feffff0700", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:29 executing program 1: semget$private(0x8, 0x4007, 0x0) 10:07:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:29 executing program 0: semctl$GETALL(0x0, 0xc4, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 5: semget$private(0x0, 0x4007, 0x2503000000000000) 10:07:30 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7c00000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1140.808010] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:30 executing program 1: semget$private(0x3a00000000000000, 0x4007, 0x0) 10:07:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:30 executing program 0: semctl$GETALL(0x0, 0x118, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1140.930625] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:30 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xec010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 5: semget$private(0x0, 0x4007, 0x18000000) 10:07:30 executing program 1: semget$private(0x4000000000000000, 0x4007, 0x0) 10:07:30 executing program 0: semctl$GETALL(0x0, 0xba01, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:30 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb1000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:30 executing program 1: semget$private(0xf301, 0x4007, 0x0) [ 1141.092954] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:30 executing program 5: semget$private(0x0, 0x4007, 0xd4020000) 10:07:30 executing program 0: semctl$GETALL(0x0, 0x28000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:30 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:30 executing program 1: semget$private(0x1800, 0x4007, 0x0) 10:07:30 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1a7, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1141.218641] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1141.249249] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:30 executing program 5: semget$private(0x0, 0x4007, 0xa030000) 10:07:30 executing program 0: semctl$GETALL(0x0, 0xca, 0xd, &(0x7f00000000c0)=""/214) [ 1141.341711] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:30 executing program 1: semget$private(0x1f0, 0x4007, 0x0) 10:07:30 executing program 5: semget$private(0x0, 0x4007, 0xd402) 10:07:30 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1141.390536] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:30 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x16f, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 0: semctl$GETALL(0x0, 0x195, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 1: semget$private(0x8000000000000000, 0x4007, 0x0) 10:07:30 executing program 5: semget$private(0x0, 0x4007, 0x42) 10:07:30 executing program 0: semctl$GETALL(0x0, 0x2e010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 5: semget$private(0x0, 0x4007, 0x4500000000000000) 10:07:30 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:30 executing program 1: semget$private(0x1200, 0x4007, 0x0) 10:07:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1141.549493] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1141.576780] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:30 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x82010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:30 executing program 5: semget$private(0x0, 0x4007, 0x2000000000000000) [ 1141.657185] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:30 executing program 0: semctl$GETALL(0x0, 0xa010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:30 executing program 1: semget$private(0xc, 0x4007, 0x0) 10:07:30 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6100, 0xd, &(0x7f00000000c0)=""/214) 10:07:30 executing program 5: semget$private(0x0, 0x4007, 0x21030000) 10:07:31 executing program 1: semget$private(0x500, 0x4007, 0x0) 10:07:31 executing program 0: semctl$GETALL(0x0, 0xc001, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1141.839530] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:31 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb501000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 5: semget$private(0x0, 0x4007, 0x2) [ 1141.910228] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000380100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:31 executing program 1: semget$private(0xfa01, 0x4007, 0x0) 10:07:31 executing program 0: semctl$GETALL(0x0, 0x1c00, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:31 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x191, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 5: semget$private(0x0, 0x4007, 0xd402000000000000) 10:07:31 executing program 1: semget$private(0xfe01000000000000, 0x4007, 0x0) 10:07:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:31 executing program 0: semctl$GETALL(0x0, 0x6301, 0xd, &(0x7f00000000c0)=""/214) [ 1142.069705] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:31 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x190, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 1: semget$private(0xf00000000000000, 0x4007, 0x0) 10:07:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:31 executing program 0: semctl$GETALL(0x0, 0x9201, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:31 executing program 5: semget$private(0x0, 0x4007, 0x44000000) 10:07:31 executing program 1: semget$private(0x6301000000000000, 0x4007, 0x0) 10:07:31 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5c01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:31 executing program 0: semctl$GETALL(0x0, 0x17a, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1142.341004] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:31 executing program 5: semget$private(0x0, 0x4007, 0xfffe) 10:07:31 executing program 1: semget$private(0xdc00000000000000, 0x4007, 0x0) 10:07:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000feffff0700", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:31 executing program 0: semctl$GETALL(0x0, 0xb300000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9f, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 5: semget$private(0x0, 0x4007, 0xa03) [ 1142.466528] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:31 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7f00, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 0: semctl$GETALL(0x0, 0x4300, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 1: semget$private(0x3500000000000000, 0x4007, 0x0) 10:07:31 executing program 1: semget$private(0xf3010000, 0x4007, 0x0) 10:07:31 executing program 5: semget$private(0x0, 0x4007, 0x66) 10:07:31 executing program 0: semctl$GETALL(0x0, 0xde, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1142.630822] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:31 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1d3, 0xd, &(0x7f00000000c0)=""/214) 10:07:31 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:31 executing program 1: semget$private(0x6101, 0x4007, 0x0) 10:07:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:31 executing program 5: semget$private(0x0, 0x4007, 0xb6) 10:07:32 executing program 0: semctl$GETALL(0x0, 0xe8, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x12d, 0xd, &(0x7f00000000c0)=""/214) [ 1142.813364] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:32 executing program 5: semget$private(0x0, 0x4007, 0xd2) 10:07:32 executing program 1: semget$private(0xfffffff0, 0x4007, 0x0) 10:07:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:32 executing program 0: semctl$GETALL(0x0, 0xbe010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x161, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000feffff0700", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:32 executing program 1: semget$private(0xf000000000000000, 0x4007, 0x0) 10:07:32 executing program 0: semctl$GETALL(0x0, 0xfc000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 5: semget$private(0x0, 0x4007, 0x4300) 10:07:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:32 executing program 1: semget$private(0x7000000, 0x4007, 0x0) 10:07:32 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x500000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 0: semctl$GETALL(0x0, 0x9c010000, 0xd, &(0x7f00000000c0)=""/214) [ 1143.096765] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:32 executing program 5: semget$private(0x0, 0x4007, 0xf00000000000000) 10:07:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:32 executing program 1: semget$private(0xf001, 0x4007, 0x0) 10:07:32 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6c01, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 5: semget$private(0x0, 0x4007, 0x2003000000000000) 10:07:32 executing program 0: semctl$GETALL(0x0, 0x1b6, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1143.290582] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1143.383950] xt_check_target: 29 callbacks suppressed [ 1143.383964] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:32 executing program 1: semget$private(0x700, 0x4007, 0x0) 10:07:32 executing program 0: semctl$GETALL(0x0, 0xca00, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 5: semget$private(0x0, 0x4007, 0xdb020000) 10:07:32 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9d, 0xd, &(0x7f00000000c0)=""/214) [ 1143.433661] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:32 executing program 0: semctl$GETALL(0x0, 0x9900000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 1: semget$private(0xdb00, 0x4007, 0x0) 10:07:32 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1a4, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 1: semget$private(0xdf00000000000000, 0x4007, 0x0) 10:07:32 executing program 5: semget$private(0x0, 0x4007, 0x43) [ 1143.568829] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1143.608828] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:32 executing program 0: semctl$GETALL(0x0, 0x78010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:32 executing program 1: semget$private(0x3600000000000000, 0x4007, 0x0) 10:07:32 executing program 0: semctl$GETALL(0x0, 0xdc000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf000000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:32 executing program 5: semget$private(0x0, 0x4007, 0x2db) [ 1143.771056] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:33 executing program 0: semctl$GETALL(0x0, 0xc5000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:33 executing program 1: semget$private(0x5000000, 0x4007, 0x0) 10:07:33 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:33 executing program 1: semget$private(0x3b000000, 0x4007, 0x0) 10:07:33 executing program 5: semget$private(0x0, 0x4007, 0x1f03) [ 1144.032669] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:33 executing program 0: semctl$GETALL(0x0, 0x138, 0xd, &(0x7f00000000c0)=""/214) 10:07:33 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:33 executing program 1: semget$private(0xf0010000, 0x4007, 0x0) 10:07:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:33 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:33 executing program 5: semget$private(0x0, 0x4007, 0x20000000) 10:07:33 executing program 1: semget$private(0xfe, 0x4007, 0x0) 10:07:33 executing program 0: semctl$GETALL(0x0, 0x165, 0xd, &(0x7f00000000c0)=""/214) [ 1144.341275] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:33 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x45000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:33 executing program 5: semget$private(0x0, 0x4007, 0x43000000) 10:07:33 executing program 1: semget$private(0xdf, 0x4007, 0x0) [ 1144.483248] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:33 executing program 0: semctl$GETALL(0x0, 0x3200000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1144.584326] IPVS: ftp: loaded support on port[0] = 21 [ 1144.778069] device bridge_slave_1 left promiscuous mode [ 1144.783599] bridge0: port 2(bridge_slave_1) entered disabled state [ 1144.818121] device bridge_slave_0 left promiscuous mode [ 1144.823565] bridge0: port 1(bridge_slave_0) entered disabled state [ 1144.887208] team0 (unregistering): Port device team_slave_1 removed [ 1144.898829] team0 (unregistering): Port device team_slave_0 removed [ 1144.909578] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1144.971109] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1145.015393] bond0 (unregistering): Released all slaves [ 1145.356938] bridge0: port 1(bridge_slave_0) entered blocking state [ 1145.363646] bridge0: port 1(bridge_slave_0) entered disabled state [ 1145.371255] device bridge_slave_0 entered promiscuous mode [ 1145.412999] bridge0: port 2(bridge_slave_1) entered blocking state [ 1145.419609] bridge0: port 2(bridge_slave_1) entered disabled state [ 1145.426996] device bridge_slave_1 entered promiscuous mode [ 1145.467179] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1145.507933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1145.635462] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1145.680673] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1145.880171] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1145.888184] team0: Port device team_slave_0 added [ 1145.928618] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1145.935943] team0: Port device team_slave_1 added [ 1145.978411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1146.022746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1146.063968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1146.108005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1146.442904] bridge0: port 2(bridge_slave_1) entered blocking state [ 1146.449398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1146.455965] bridge0: port 1(bridge_slave_0) entered blocking state [ 1146.462334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1146.469539] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1147.297418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1147.348537] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1147.432051] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1147.513547] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1147.519999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1147.528474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1147.605122] 8021q: adding VLAN 0 to HW filter on device team0 10:07:37 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:37 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1c00, 0xd, &(0x7f00000000c0)=""/214) 10:07:37 executing program 5: semget$private(0x0, 0x4007, 0xfeffffff) 10:07:37 executing program 1: semget$private(0xf0, 0x4007, 0x0) 10:07:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:37 executing program 0: semctl$GETALL(0x0, 0xf601000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1148.105002] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1148.139300] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:37 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x17c, 0xd, &(0x7f00000000c0)=""/214) 10:07:37 executing program 1: semget$private(0x1600000000000000, 0x4007, 0x0) 10:07:37 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:37 executing program 0: semctl$GETALL(0x0, 0x6101000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:37 executing program 5: semget$private(0x0, 0x4007, 0x30a) [ 1148.179512] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:37 executing program 1: semget$private(0x100000000000000, 0x4007, 0x0) 10:07:37 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9b010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:37 executing program 0: semctl$GETALL(0x0, 0xc900000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:37 executing program 5: semget$private(0x0, 0x4007, 0x600) [ 1148.316414] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1148.328153] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:37 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000ffffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000400200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:37 executing program 0: semctl$GETALL(0x0, 0xf3010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:37 executing program 1: semget$private(0xfeffffff00000000, 0x4007, 0x0) 10:07:37 executing program 5: semget$private(0x0, 0x4007, 0x500) 10:07:37 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:37 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9b01, 0xd, &(0x7f00000000c0)=""/214) 10:07:37 executing program 5: semget$private(0x0, 0x4007, 0x6600000000000000) 10:07:37 executing program 1: semget$private(0xf0000000, 0x4007, 0x0) 10:07:37 executing program 0: semctl$GETALL(0x0, 0xa1010000, 0xd, &(0x7f00000000c0)=""/214) [ 1148.533593] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1148.559773] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:37 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:37 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3e01, 0xd, &(0x7f00000000c0)=""/214) 10:07:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000ffffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:37 executing program 0: semctl$GETALL(0x0, 0x69, 0xd, &(0x7f00000000c0)=""/214) 10:07:37 executing program 5: semget$private(0x0, 0x4007, 0x100000000000000) 10:07:37 executing program 1: semget$private(0xf00, 0x4007, 0x0) 10:07:37 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:37 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x171, 0xd, &(0x7f00000000c0)=""/214) [ 1148.703489] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:37 executing program 5: semget$private(0x0, 0x4007, 0xfffffffe) 10:07:37 executing program 0: semctl$GETALL(0x0, 0x1d, 0xd, &(0x7f00000000c0)=""/214) 10:07:37 executing program 1: semget$private(0xa00000000000000, 0x4007, 0x0) 10:07:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1148.835324] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1148.858323] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:38 executing program 0: semctl$GETALL(0x0, 0x3b01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:38 executing program 5: semget$private(0x0, 0x4007, 0xd1000000) 10:07:38 executing program 1: semget$private(0xf401000000000000, 0x4007, 0x0) 10:07:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1c7, 0xd, &(0x7f00000000c0)=""/214) [ 1148.884148] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:38 executing program 0: semctl$GETALL(0x0, 0xf4010000, 0xd, &(0x7f00000000c0)=""/214) [ 1148.949736] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:38 executing program 5: semget$private(0x0, 0x4007, 0x3f00000000000000) 10:07:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:38 executing program 1: semget$private(0x63010000, 0x4007, 0x0) [ 1148.993925] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8b00, 0xd, &(0x7f00000000c0)=""/214) [ 1149.037949] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:38 executing program 0: semctl$GETALL(0x0, 0x5600, 0xd, &(0x7f00000000c0)=""/214) 10:07:38 executing program 5: semget$private(0x0, 0x4007, 0xd2000000) 10:07:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:38 executing program 1: semget$private(0x3a000000, 0x4007, 0x0) [ 1149.119226] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:38 executing program 0: semctl$GETALL(0x0, 0x9a, 0xd, &(0x7f00000000c0)=""/214) 10:07:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x2f00, 0xd, &(0x7f00000000c0)=""/214) 10:07:38 executing program 5: semget$private(0x0, 0x4007, 0x3f000000) 10:07:38 executing program 0: semctl$GETALL(0x0, 0xb6, 0xd, &(0x7f00000000c0)=""/214) [ 1149.236127] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1149.265150] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:38 executing program 1: semget$private(0xdc000000, 0x4007, 0x0) 10:07:38 executing program 0: semctl$GETALL(0x0, 0x6401, 0xd, &(0x7f00000000c0)=""/214) 10:07:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1149.299557] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x90010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:38 executing program 5: semget$private(0x0, 0x4007, 0xd3) 10:07:38 executing program 1: semget$private(0xf000, 0x4007, 0x0) [ 1149.382716] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:38 executing program 0: semctl$GETALL(0x0, 0x5600000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9d00, 0xd, &(0x7f00000000c0)=""/214) 10:07:38 executing program 5: semget$private(0x0, 0x4007, 0xfeffffffffffffff) [ 1149.451637] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:38 executing program 1: semget$private(0x39, 0x4007, 0x0) 10:07:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3501, 0xd, &(0x7f00000000c0)=""/214) 10:07:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:38 executing program 0: semctl$GETALL(0x0, 0x5a00, 0xd, &(0x7f00000000c0)=""/214) [ 1149.543718] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:38 executing program 1: semget$private(0xdd, 0x4007, 0x0) 10:07:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x15e, 0xd, &(0x7f00000000c0)=""/214) [ 1149.608022] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:38 executing program 5: semget$private(0x0, 0x4007, 0x1f030000) 10:07:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:38 executing program 0: semctl$GETALL(0x0, 0x6d01000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1149.648250] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:38 executing program 1: semget$private(0xf7010000, 0x4007, 0x0) 10:07:38 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x156, 0xd, &(0x7f00000000c0)=""/214) 10:07:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:38 executing program 5: semget$private(0x0, 0x4007, 0x42000000) [ 1149.730463] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:38 executing program 0: semctl$GETALL(0x0, 0x9f00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:38 executing program 1: semget$private(0x9000000, 0x4007, 0x0) 10:07:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1149.828197] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:39 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1e5, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 0: semctl$GETALL(0x0, 0x129, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 5: semget$private(0x0, 0x4007, 0x6600) 10:07:39 executing program 1: semget$private(0x1300, 0x4007, 0x0) [ 1149.882297] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1149.938997] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1149.969922] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:39 executing program 1: semget$private(0xdf00, 0x4007, 0x0) 10:07:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:39 executing program 0: semctl$GETALL(0x0, 0x122, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf500, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 5: semget$private(0x0, 0x4007, 0x300000000000000) [ 1149.996440] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:39 executing program 0: semctl$GETALL(0x0, 0xb501, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 1: semget$private(0x1f3, 0x4007, 0x0) [ 1150.056669] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:39 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5e00, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 5: semget$private(0x0, 0x4007, 0x1800) 10:07:39 executing program 0: semctl$GETALL(0x0, 0x1800, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 1: semget$private(0xd, 0x4007, 0x0) 10:07:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1150.185839] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:39 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf701000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 1: semget$private(0xf000000, 0x4007, 0x0) 10:07:39 executing program 5: semget$private(0x0, 0x4007, 0x2000) [ 1150.287156] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:39 executing program 0: semctl$GETALL(0x0, 0xe2, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 1: semget$private(0x3900, 0x4007, 0x0) 10:07:39 executing program 5: semget$private(0x0, 0x4007, 0x2103) 10:07:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:39 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc000000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1150.435851] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:39 executing program 1: semget$private(0x0, 0x4003, 0x0) [ 1150.510405] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:39 executing program 0: semctl$GETALL(0x0, 0x7e00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x37000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 5: semget$private(0x0, 0x4007, 0x4000000000000000) 10:07:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1150.556054] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:39 executing program 0: semctl$GETALL(0x0, 0xc000000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 5: semget$private(0x0, 0x4007, 0xb600000000000000) 10:07:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:39 executing program 1: semget$private(0x0, 0x7d00, 0x0) 10:07:39 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7900, 0xd, &(0x7f00000000c0)=""/214) 10:07:39 executing program 0: semctl$GETALL(0x0, 0x43010000, 0xd, &(0x7f00000000c0)=""/214) [ 1150.715433] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:39 executing program 5: semget$private(0x0, 0x4007, 0x803000000000000) 10:07:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:39 executing program 0: semctl$GETALL(0x0, 0xb01000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1150.759467] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:40 executing program 1: semget$private(0x0, 0xfffffd, 0x0) 10:07:40 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xec01, 0xd, &(0x7f00000000c0)=""/214) [ 1150.844321] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:40 executing program 0: semctl$GETALL(0x0, 0xe100, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 5: semget$private(0x0, 0x4007, 0x200000000000000) 10:07:40 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:40 executing program 1: semget$private(0x0, 0x401d, 0x0) [ 1150.889388] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:40 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 0: semctl$GETALL(0x0, 0x3501, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 5: semget$private(0x0, 0x4007, 0xf0ffffff00000000) 10:07:40 executing program 1: semget$private(0x0, 0x400c, 0x0) [ 1151.006289] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:40 executing program 0: semctl$GETALL(0x0, 0x60, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1151.071717] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:40 executing program 1: semget$private(0x0, 0x4006, 0x0) 10:07:40 executing program 5: semget$private(0x0, 0x4007, 0x66000000) 10:07:40 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc1000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:40 executing program 0: semctl$GETALL(0x0, 0xfa00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:40 executing program 5: semget$private(0x0, 0x4007, 0x803) 10:07:40 executing program 1: semget$private(0x0, 0x4008, 0x0) 10:07:40 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9d01, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 0: semctl$GETALL(0x0, 0xff01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:40 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1151.308880] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:40 executing program 5: semget$private(0x0, 0x4007, 0x4000) 10:07:40 executing program 1: semget$private(0x0, 0x4007, 0xf) 10:07:40 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xe3, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 0: semctl$GETALL(0x0, 0xf0010000, 0xd, &(0x7f00000000c0)=""/214) [ 1151.463174] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:40 executing program 5: semget$private(0x0, 0x4007, 0x20030000) 10:07:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1151.518300] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:40 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8501000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 1: semget$private(0x0, 0x4007, 0x3b00000000000000) 10:07:40 executing program 0: semctl$GETALL(0x0, 0xa501, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 5: semget$private(0x0, 0x4007, 0x6) 10:07:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:40 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:40 executing program 1: semget$private(0x0, 0x4007, 0x400000000000000) 10:07:40 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xad01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 0: semctl$GETALL(0x0, 0x600, 0xd, &(0x7f00000000c0)=""/214) 10:07:40 executing program 5: semget$private(0x0, 0x4007, 0xffffffffffffffff) [ 1151.719930] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:40 executing program 1: semget$private(0x0, 0x4007, 0x1400000000000000) 10:07:40 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:41 executing program 0: semctl$GETALL(0x0, 0x7801000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 5: semget$private(0x0, 0x4007, 0xfffffff0) 10:07:41 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x23000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1151.840380] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:41 executing program 0: semctl$GETALL(0x0, 0x6800000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 1: semget$private(0x0, 0x4007, 0x12000000) 10:07:41 executing program 5: semget$private(0x0, 0x4007, 0xd300000000000000) 10:07:41 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x73000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:41 executing program 0: semctl$GETALL(0x0, 0x201, 0xd, &(0x7f00000000c0)=""/214) [ 1152.003271] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:41 executing program 1: semget$private(0x0, 0x4007, 0x9000000) 10:07:41 executing program 5: semget$private(0x0, 0x4007, 0x4) 10:07:41 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x166, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 0: semctl$GETALL(0x0, 0x2100000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1152.123130] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:41 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xdb00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 0: semctl$GETALL(0x0, 0x700000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:41 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:41 executing program 5: semget$private(0x0, 0x4007, 0x45) 10:07:41 executing program 1: semget$private(0x0, 0x4007, 0x35000000) 10:07:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:41 executing program 1: semget$private(0x0, 0x4007, 0x14000000) 10:07:41 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xeb000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 0: semctl$GETALL(0x0, 0x8a, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 5: semget$private(0x0, 0x4007, 0x2000000) [ 1152.368351] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:41 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:41 executing program 0: semctl$GETALL(0x0, 0x16c, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x92, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 5: semget$private(0x0, 0x4007, 0x4200) 10:07:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:41 executing program 0: semctl$GETALL(0x0, 0x1c01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 1: semget$private(0x0, 0x4007, 0x1f0) [ 1152.586688] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:41 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:41 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6d01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 0: semctl$GETALL(0x0, 0x4801, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 5: semget$private(0x0, 0x4007, 0x320) 10:07:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:41 executing program 1: semget$private(0x0, 0x4007, 0xdd) [ 1152.715563] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:41 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x83000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:41 executing program 5: semget$private(0x0, 0x4007, 0x4000000000000) 10:07:42 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:42 executing program 0: semctl$GETALL(0x0, 0x174, 0xd, &(0x7f00000000c0)=""/214) 10:07:42 executing program 1: semget$private(0x0, 0x4007, 0x16) 10:07:42 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6c00, 0xd, &(0x7f00000000c0)=""/214) 10:07:42 executing program 5: semget$private(0x0, 0x4007, 0x2103000000000000) 10:07:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1152.884244] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:42 executing program 1: semget$private(0x0, 0x4007, 0x900000000000000) 10:07:42 executing program 0: semctl$GETALL(0x0, 0x1b5, 0xd, &(0x7f00000000c0)=""/214) 10:07:42 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:42 executing program 5: semget$private(0x0, 0x4007, 0x3000000) 10:07:42 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x146, 0xd, &(0x7f00000000c0)=""/214) 10:07:42 executing program 0: semctl$GETALL(0x0, 0x19, 0xd, &(0x7f00000000c0)=""/214) 10:07:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:42 executing program 5: semget$private(0x0, 0x4007, 0xd1) 10:07:42 executing program 1: semget$private(0x0, 0x4007, 0xd900000000000000) 10:07:42 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc400000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:42 executing program 5: semget$private(0x0, 0x4007, 0xa) 10:07:42 executing program 0: semctl$GETALL(0x0, 0x6900000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:42 executing program 1: semget$private(0x0, 0x4007, 0x17000000) 10:07:42 executing program 5: semget$private(0x0, 0x4007, 0x400000000000000) 10:07:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:42 executing program 0: semctl$GETALL(0x0, 0x193, 0xd, &(0x7f00000000c0)=""/214) 10:07:42 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xbd01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:42 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:42 executing program 1: semget$private(0x0, 0x4007, 0xfeffffff) 10:07:42 executing program 0: semctl$GETALL(0x0, 0xd700000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:42 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xfa00000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1153.696516] xt_check_target: 28 callbacks suppressed [ 1153.696531] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:42 executing program 1: semget$private(0x0, 0x4007, 0xf0000000) 10:07:42 executing program 5: semget$private(0x0, 0x4007, 0x300) 10:07:42 executing program 0: semctl$GETALL(0x0, 0x48000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:43 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf9000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:43 executing program 1: semget$private(0x0, 0x4007, 0xf000000) [ 1153.920457] IPVS: ftp: loaded support on port[0] = 21 [ 1154.107897] device bridge_slave_1 left promiscuous mode [ 1154.113407] bridge0: port 2(bridge_slave_1) entered disabled state [ 1154.168159] device bridge_slave_0 left promiscuous mode [ 1154.173645] bridge0: port 1(bridge_slave_0) entered disabled state [ 1154.256572] team0 (unregistering): Port device team_slave_1 removed [ 1154.266273] team0 (unregistering): Port device team_slave_0 removed [ 1154.276406] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1154.321361] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1154.406060] bond0 (unregistering): Released all slaves [ 1154.745157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1154.751671] bridge0: port 1(bridge_slave_0) entered disabled state [ 1154.759057] device bridge_slave_0 entered promiscuous mode [ 1154.799925] bridge0: port 2(bridge_slave_1) entered blocking state [ 1154.806437] bridge0: port 2(bridge_slave_1) entered disabled state [ 1154.813842] device bridge_slave_1 entered promiscuous mode [ 1154.853335] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1154.890833] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1155.003574] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1155.044076] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1155.220087] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1155.228431] team0: Port device team_slave_0 added [ 1155.264816] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1155.272403] team0: Port device team_slave_1 added [ 1155.308737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1155.349120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1155.389961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1155.430071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1155.724903] bridge0: port 2(bridge_slave_1) entered blocking state [ 1155.731276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1155.737898] bridge0: port 1(bridge_slave_0) entered blocking state [ 1155.744226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1155.752205] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1156.562673] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1156.637517] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1156.667399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1156.714356] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1156.720856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1156.728302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1156.800395] 8021q: adding VLAN 0 to HW filter on device team0 10:07:46 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000380100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:46 executing program 5: semget$private(0x0, 0x4007, 0x4500) 10:07:46 executing program 0: semctl$GETALL(0x0, 0x1cd, 0xd, &(0x7f00000000c0)=""/214) 10:07:46 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xaf01, 0xd, &(0x7f00000000c0)=""/214) 10:07:46 executing program 1: semget$private(0x0, 0x4007, 0xf000) [ 1157.303747] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1157.312662] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:46 executing program 1: semget$private(0x0, 0x4007, 0x18) 10:07:46 executing program 5: semget$private(0x0, 0x4007, 0x1f03000000000000) 10:07:46 executing program 0: semctl$GETALL(0x0, 0xf4, 0xd, &(0x7f00000000c0)=""/214) 10:07:46 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7500, 0xd, &(0x7f00000000c0)=""/214) [ 1157.355949] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1157.368697] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1157.390120] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:46 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:46 executing program 0: semctl$GETALL(0x0, 0x200000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:46 executing program 1: semget$private(0x0, 0x4007, 0xb) [ 1157.469509] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1157.509009] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:46 executing program 5: semget$private(0x0, 0x4007, 0xa000000) 10:07:46 executing program 0: semctl$GETALL(0x0, 0x7600000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:46 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:46 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x64000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000feffff0700", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:46 executing program 1: semget$private(0x0, 0x4007, 0xdc) [ 1157.599339] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:46 executing program 0: semctl$GETALL(0x0, 0xde01, 0xd, &(0x7f00000000c0)=""/214) 10:07:46 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:46 executing program 5: semget$private(0x0, 0x4007, 0x40000000) [ 1157.671090] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:46 executing program 0: semctl$GETALL(0x0, 0x11a, 0xd, &(0x7f00000000c0)=""/214) 10:07:46 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa9010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:46 executing program 1: semget$private(0x0, 0x4007, 0xe) 10:07:46 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9700, 0xd, &(0x7f00000000c0)=""/214) [ 1157.762439] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1157.776922] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:47 executing program 5: semget$private(0x0, 0x4007, 0xdb02) 10:07:47 executing program 0: semctl$GETALL(0x0, 0x8b00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:47 executing program 5: semget$private(0x0, 0x4007, 0x325) 10:07:47 executing program 0: semctl$GETALL(0x0, 0xcb000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 1: semget$private(0x0, 0x4007, 0xf401000000000000) 10:07:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1157.902202] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:47 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9501, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 5: semget$private(0x0, 0x4007, 0x6700000000000000) [ 1157.980182] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:47 executing program 1: semget$private(0x0, 0x4007, 0xc000000) 10:07:47 executing program 0: semctl$GETALL(0x0, 0xeb000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1158.024196] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:47 executing program 5: semget$private(0x0, 0x4007, 0xda000000) 10:07:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:47 executing program 1: semget$private(0x0, 0x4007, 0xe00) 10:07:47 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5b00, 0xd, &(0x7f00000000c0)=""/214) [ 1158.126237] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1158.139598] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:47 executing program 0: semctl$GETALL(0x0, 0x4600, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 5: semget$private(0x0, 0x4007, 0xb600) [ 1158.205962] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:47 executing program 1: semget$private(0x0, 0x4007, 0xfe) 10:07:47 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9e00000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1158.270412] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:47 executing program 5: semget$private(0x0, 0x4007, 0x8000000000000000) 10:07:47 executing program 0: semctl$GETALL(0x0, 0xd01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1158.314265] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:47 executing program 1: semget$private(0x0, 0x4007, 0x5) 10:07:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:47 executing program 0: semctl$GETALL(0x0, 0x1000000, 0xd, &(0x7f00000000c0)=""/214) [ 1158.398896] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:47 executing program 5: semget$private(0x0, 0x4007, 0x2003) 10:07:47 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x35000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 0: semctl$GETALL(0x0, 0x4600000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 1: semget$private(0x0, 0x4007, 0x3a) 10:07:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1158.492224] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:47 executing program 0: semctl$GETALL(0x0, 0x3c00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 1: semget$private(0x0, 0x4007, 0x100000000000000) 10:07:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:47 executing program 5: semget$private(0x0, 0x4007, 0x4400) [ 1158.550103] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1158.576462] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:47 executing program 0: semctl$GETALL(0x0, 0x7a00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb400, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000400200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:47 executing program 1: semget$private(0x0, 0x4007, 0x6301000000000000) 10:07:47 executing program 5: semget$private(0x0, 0x4007, 0xd100) 10:07:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1158.692835] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1158.711540] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:47 executing program 0: semctl$GETALL(0x0, 0xcb010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:47 executing program 1: semget$private(0x0, 0x4007, 0x6001000000000000) 10:07:47 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa101, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 5: semget$private(0x0, 0x4007, 0xf) 10:07:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1158.829372] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1158.868860] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:48 executing program 1: semget$private(0x0, 0x4007, 0x40000000) 10:07:48 executing program 0: semctl$GETALL(0x0, 0x47000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 5: semget$private(0x0, 0x4007, 0x4400000000000000) 10:07:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:48 executing program 1: semget$private(0x0, 0x4007, 0xf2010000) [ 1158.981433] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1159.005321] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:48 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa701, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 0: semctl$GETALL(0x0, 0xaf00, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 5: semget$private(0x0, 0x4007, 0xd200000000000000) 10:07:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1159.023818] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:48 executing program 1: semget$private(0x0, 0x4007, 0xd9000000) 10:07:48 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xe2, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 5: semget$private(0x0, 0x4007, 0xdb02000000000000) [ 1159.147511] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1159.171477] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:48 executing program 0: semctl$GETALL(0x0, 0x119, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1159.213968] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:48 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8b01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 5: semget$private(0x0, 0x4007, 0x1800000000000000) 10:07:48 executing program 1: semget$private(0x0, 0x4007, 0x3000000) [ 1159.302894] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:48 executing program 0: semctl$GETALL(0x0, 0x1ac, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1159.356273] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:48 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x700, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 5: semget$private(0x0, 0x4007, 0x4000000) 10:07:48 executing program 1: semget$private(0x0, 0x4007, 0xffffffffffffffff) 10:07:48 executing program 0: semctl$GETALL(0x0, 0x4501000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 0: semctl$GETALL(0x0, 0xc1000000, 0xd, &(0x7f00000000c0)=""/214) [ 1159.462038] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1159.497483] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:48 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc000, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 5: semget$private(0x0, 0x4007, 0x5000000) 10:07:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1159.531038] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:48 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x34, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 1: semget$private(0x0, 0x4007, 0x3) [ 1159.640386] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:48 executing program 0: semctl$GETALL(0x0, 0xf6000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:48 executing program 5: semget$private(0x0, 0x4007, 0x6700) [ 1159.680654] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1159.705108] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000ffffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:48 executing program 1: semget$private(0x0, 0x4007, 0x39) 10:07:48 executing program 0: semctl$GETALL(0x0, 0x9f000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:48 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xac00000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1159.748981] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:49 executing program 5: semget$private(0x0, 0x4007, 0x67000000) 10:07:49 executing program 1: semget$private(0x0, 0x4007, 0xfe01000000000000) [ 1159.833688] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:49 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4401, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:49 executing program 0: semctl$GETALL(0x0, 0x1c01, 0xd, &(0x7f00000000c0)=""/214) [ 1159.885294] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1159.906564] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:49 executing program 1: semget$private(0x0, 0x4007, 0x18000000) 10:07:49 executing program 5: semget$private(0x0, 0x4007, 0xf00) 10:07:49 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc1, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1159.996710] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:49 executing program 1: semget$private(0x0, 0x4007, 0x61010000) 10:07:49 executing program 0: semctl$GETALL(0x0, 0x7301, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1160.070927] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1160.081836] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:49 executing program 5: semget$private(0x0, 0x4007, 0xfffffffffffffffe) 10:07:49 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1b01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 0: semctl$GETALL(0x0, 0xcb01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:49 executing program 1: semget$private(0x0, 0x4007, 0x3b00) 10:07:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:49 executing program 5: semget$private(0x0, 0x4007, 0x31f) 10:07:49 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x14000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 0: semctl$GETALL(0x0, 0xec00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:49 executing program 1: semget$private(0x0, 0x4007, 0x1fe) [ 1160.296110] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1160.324454] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:49 executing program 5: semget$private(0x0, 0x4007, 0x3) 10:07:49 executing program 0: semctl$GETALL(0x0, 0xe101, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 1: semget$private(0x0, 0x4007, 0xfa01000000000000) 10:07:49 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1fe, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1160.449328] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:49 executing program 5: semget$private(0x0, 0x4007, 0x308) 10:07:49 executing program 1: semget$private(0x0, 0x4007, 0x1700000000000000) 10:07:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1160.536404] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:49 executing program 0: semctl$GETALL(0x0, 0xb01, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000380100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:49 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7700000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 5: semget$private(0x0, 0x4007, 0x6000000) 10:07:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:49 executing program 1: semget$private(0x0, 0x4007, 0xfeffffffffffffff) 10:07:49 executing program 0: semctl$GETALL(0x0, 0x8901, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:49 executing program 5: semget$private(0x0, 0x4007, 0x18) 10:07:49 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3001000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:49 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1160.762695] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:49 executing program 1: semget$private(0x0, 0x4007, 0xf000000000000000) 10:07:50 executing program 0: semctl$GETALL(0x0, 0x91000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000ffffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1160.875019] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1160.885959] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:50 executing program 5: semget$private(0x0, 0x4007, 0x4200000000000000) 10:07:50 executing program 1: semget$private(0x0, 0x4007, 0x1000000) 10:07:50 executing program 0: semctl$GETALL(0x0, 0xba010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9a010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:50 executing program 0: semctl$GETALL(0x0, 0xb700000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:50 executing program 5: semget$private(0x0, 0x4007, 0xd100000000000000) [ 1161.012060] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:50 executing program 1: semget$private(0x0, 0x4007, 0xe000000) 10:07:50 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1d000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:50 executing program 1: semget$private(0x0, 0x4007, 0xdf000000) 10:07:50 executing program 0: semctl$GETALL(0x0, 0xbc00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 5: semget$private(0x0, 0x4007, 0x25030000) 10:07:50 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3d, 0xd, &(0x7f00000000c0)=""/214) [ 1161.188328] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:50 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1161.245902] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:50 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 5: semget$private(0x0, 0x4007, 0x1000000) 10:07:50 executing program 0: semctl$GETALL(0x0, 0x1f000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:50 executing program 1: semget$private(0x0, 0x4007, 0xfe01) 10:07:50 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1161.364761] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:50 executing program 5: semget$private(0x0, 0x4007, 0x3f00) 10:07:50 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7d, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 0: semctl$GETALL(0x0, 0xea00, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 1: semget$private(0x0, 0x4007, 0x1fa) 10:07:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:50 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:50 executing program 5: semget$private(0x0, 0x4007, 0x2503) 10:07:50 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xfd01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 0: semctl$GETALL(0x0, 0x73, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:50 executing program 1: semget$private(0x0, 0x4007, 0x1f3) [ 1161.598269] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:50 executing program 0: semctl$GETALL(0x0, 0xfb, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 5: semget$private(0x0, 0x4007, 0x600000000000000) 10:07:50 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:50 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc301, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:50 executing program 0: semctl$GETALL(0x0, 0x18d, 0xd, &(0x7f00000000c0)=""/214) 10:07:50 executing program 1: semget$private(0x0, 0x4007, 0xdc00000000000000) 10:07:50 executing program 5: semget$private(0x0, 0x4007, 0xda00000000000000) 10:07:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:51 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf600, 0xd, &(0x7f00000000c0)=""/214) 10:07:51 executing program 5: semget$private(0x0, 0x4007, 0xd3000000) 10:07:51 executing program 0: semctl$GETALL(0x0, 0x3e00, 0xd, &(0x7f00000000c0)=""/214) 10:07:51 executing program 1: semget$private(0x0, 0x4007, 0x3600000000000000) 10:07:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:51 executing program 0: semctl$GETALL(0x0, 0x87000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:51 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9500000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:51 executing program 5: semget$private(0x0, 0x4007, 0x8030000) 10:07:51 executing program 1: semget$private(0x0, 0x4007, 0xdc000000) 10:07:51 executing program 0: semctl$GETALL(0x0, 0xd0, 0xd, &(0x7f00000000c0)=""/214) 10:07:51 executing program 5: semget$private(0x0, 0x4007, 0xb6000000) 10:07:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:51 executing program 1: semget$private(0x0, 0x4007, 0x13000000) 10:07:51 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xfe010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:51 executing program 0: semctl$GETALL(0x0, 0x1a1, 0xd, &(0x7f00000000c0)=""/214) [ 1162.660620] IPVS: ftp: loaded support on port[0] = 21 [ 1162.847860] device bridge_slave_1 left promiscuous mode [ 1162.853469] bridge0: port 2(bridge_slave_1) entered disabled state [ 1162.908216] device bridge_slave_0 left promiscuous mode [ 1162.913647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1162.967523] team0 (unregistering): Port device team_slave_1 removed [ 1162.977014] team0 (unregistering): Port device team_slave_0 removed [ 1162.987861] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1163.042302] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1163.105396] bond0 (unregistering): Released all slaves [ 1163.481037] bridge0: port 1(bridge_slave_0) entered blocking state [ 1163.487585] bridge0: port 1(bridge_slave_0) entered disabled state [ 1163.494876] device bridge_slave_0 entered promiscuous mode [ 1163.537219] bridge0: port 2(bridge_slave_1) entered blocking state [ 1163.544194] bridge0: port 2(bridge_slave_1) entered disabled state [ 1163.552052] device bridge_slave_1 entered promiscuous mode [ 1163.593627] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1163.635406] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1163.755955] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1163.798772] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1163.995243] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1164.002714] team0: Port device team_slave_0 added [ 1164.043968] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1164.051712] team0: Port device team_slave_1 added [ 1164.094309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1164.138455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1164.185061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1164.231390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1164.531015] bridge0: port 2(bridge_slave_1) entered blocking state [ 1164.537557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1164.544199] bridge0: port 1(bridge_slave_0) entered blocking state [ 1164.550584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1164.558283] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1165.387550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1165.451040] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1165.530945] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1165.609724] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1165.615856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1165.623586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1165.699287] 8021q: adding VLAN 0 to HW filter on device team0 10:07:55 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:55 executing program 5: semget$private(0x0, 0x4007, 0xfe) 10:07:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:55 executing program 1: semget$private(0x0, 0x4007, 0xf4010000) 10:07:55 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xee01, 0xd, &(0x7f00000000c0)=""/214) 10:07:55 executing program 0: semctl$GETALL(0x0, 0xf8, 0xd, &(0x7f00000000c0)=""/214) [ 1166.226400] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1166.235292] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1166.269979] xt_check_target: 19 callbacks suppressed [ 1166.269994] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:55 executing program 5: semget$private(0x0, 0x4007, 0x5) 10:07:55 executing program 0: semctl$GETALL(0x0, 0x1701000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:55 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x12a, 0xd, &(0x7f00000000c0)=""/214) 10:07:55 executing program 1: semget$private(0x0, 0x4007, 0xfffffff0) 10:07:55 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1166.330370] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:55 executing program 0: semctl$GETALL(0x0, 0xca000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:55 executing program 5: semget$private(0x0, 0x4007, 0x4300000000000000) [ 1166.444085] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1166.480664] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:55 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1ed, 0xd, &(0x7f00000000c0)=""/214) 10:07:55 executing program 1: semget$private(0x0, 0x4007, 0xa00) 10:07:55 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:55 executing program 0: semctl$GETALL(0x0, 0x7f010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:55 executing program 5: semget$private(0x0, 0x4007, 0x45000000) 10:07:55 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5b01000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1166.606698] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1166.620281] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1166.631999] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:55 executing program 1: semget$private(0x0, 0x4007, 0xfeff) 10:07:55 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:55 executing program 0: semctl$GETALL(0x0, 0x139, 0xd, &(0x7f00000000c0)=""/214) 10:07:55 executing program 5: semget$private(0x0, 0x4007, 0xf000000) 10:07:55 executing program 0: semctl$GETALL(0x0, 0xc3, 0xd, &(0x7f00000000c0)=""/214) 10:07:55 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc901000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1166.747412] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1166.769814] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:56 executing program 1: semget$private(0x0, 0x4007, 0xd) 10:07:56 executing program 5: semget$private(0x0, 0x4007, 0xda00) 10:07:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:56 executing program 0: semctl$GETALL(0x0, 0x18e, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x59000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 5: semget$private(0x0, 0x4007, 0x321) 10:07:56 executing program 1: semget$private(0x0, 0x4007, 0xa) [ 1166.923266] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1166.951396] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1166.976765] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:56 executing program 0: semctl$GETALL(0x0, 0xaa00, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 5: semget$private(0x0, 0x4007, 0x500000000000000) 10:07:56 executing program 1: semget$private(0x0, 0x4007, 0x1500000000000000) 10:07:56 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x2000, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 0: semctl$GETALL(0x0, 0xb7, 0xd, &(0x7f00000000c0)=""/214) [ 1167.099262] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1167.134742] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:56 executing program 5: semget$private(0x0, 0x4007, 0xa00000000000000) 10:07:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:56 executing program 1: semget$private(0x0, 0x4007, 0x800000000000000) [ 1167.200389] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:56 executing program 0: semctl$GETALL(0x0, 0xcf, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x181, 0xd, &(0x7f00000000c0)=""/214) [ 1167.276613] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1167.314682] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:56 executing program 5: semget$private(0x0, 0x4007, 0xf0ffffff) 10:07:56 executing program 1: semget$private(0x0, 0x4007, 0xf201000000000000) [ 1167.350855] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:56 executing program 0: semctl$GETALL(0x0, 0xb400000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 5: semget$private(0x0, 0x4007, 0xda) 10:07:56 executing program 1: semget$private(0x0, 0x4007, 0x1200) 10:07:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000000000ff", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1167.434570] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000feffff0700", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:56 executing program 0: semctl$GETALL(0x0, 0x4d00, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3c01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 0: semctl$GETALL(0x0, 0x8801, 0xd, &(0x7f00000000c0)=""/214) [ 1167.523556] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:07:56 executing program 1: semget$private(0x0, 0x4007, 0xd9) 10:07:56 executing program 5: semget$private(0x0, 0x4007, 0xa00) [ 1167.584903] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1167.585911] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:56 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5300000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 0: semctl$GETALL(0x0, 0x4d010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1167.630650] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:56 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x13c, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 5: semget$private(0x0, 0x4007, 0x67) 10:07:56 executing program 1: semget$private(0x0, 0x4007, 0x1fd) 10:07:56 executing program 0: semctl$GETALL(0x0, 0xd4000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000005", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:57 executing program 5: semget$private(0x0, 0x4007, 0x44) 10:07:57 executing program 0: semctl$GETALL(0x0, 0x9c01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x28, 0xd, &(0x7f00000000c0)=""/214) [ 1167.819719] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:57 executing program 1: semget$private(0x0, 0x4007, 0xfffffffe) [ 1167.862980] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:57 executing program 0: semctl$GETALL(0x0, 0xd6000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:57 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3501000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 1: semget$private(0x0, 0x4007, 0xfeffffff00000000) 10:07:57 executing program 0: semctl$GETALL(0x0, 0x29, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:57 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x41, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) write$P9_RGETLOCK(r0, &(0x7f0000000080)={0x28, 0x37, 0x1, {0x3, 0xfc, 0x4, r1, 0xa, '%vboxnet1^'}}, 0x28) [ 1168.020269] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:57 executing program 1: semget$private(0x0, 0x4007, 0xf00000000000000) 10:07:57 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1f01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 0: semctl$GETALL(0x0, 0x4a00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1168.139397] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:57 executing program 0: semctl$GETALL(0x0, 0x65010000, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 1: semget$private(0x0, 0x4007, 0x3b000000) 10:07:57 executing program 0: semctl$GETALL(0x0, 0x1201000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:57 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb010000, 0xd, &(0x7f00000000c0)=""/214) [ 1168.322743] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:57 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5700, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 1: semget$private(0x0, 0x4007, 0xf3010000) 10:07:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) semget$private(0x0, 0x4007, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1f, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x7}, r1}}, 0x30) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400, 0x0) 10:07:57 executing program 0: semctl$GETALL(0x0, 0x8c000000, 0xd, &(0x7f00000000c0)=""/214) [ 1168.368610] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:57 executing program 1: semget$private(0x0, 0x4007, 0xdd000000) 10:07:57 executing program 0: semctl$GETALL(0x0, 0x1e010000, 0xd, &(0x7f00000000c0)=""/214) [ 1168.468404] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:57 executing program 5: socket$unix(0x1, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20440, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0x9, 0x9, 0x32b9, 0x8000}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000200), 0x4) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000000c0)={0x7, 0x29a, 0xbc, 0x0, 0x0, [], [], [], 0xfffffffffffffffc, 0x1000}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000240)={'veth1_to_bond\x00', 0x4}) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000080)={0x3, 0x10000}) 10:07:57 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8701, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 0: semctl$GETALL(0x0, 0x152, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x204000) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x80, 0x20800, 0x7a, 0x6c2, 0x8}}, 0x50) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0x0, 0x6, {0x0, 0x3}}, 0x20) 10:07:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:57 executing program 0: semctl$GETALL(0x0, 0xa001000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1168.622779] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1168.656308] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:57 executing program 1: semget$private(0x0, 0x4007, 0x6001) 10:07:57 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xe900, 0xd, &(0x7f00000000c0)=""/214) 10:07:57 executing program 5: semget$private(0x0, 0xfffffffffffffffb, 0x1000000) r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x404040) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, r0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000000)=0x3d) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000040)={0x2, 0x0, [{}, {}]}) 10:07:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:57 executing program 0: semctl$GETALL(0x0, 0x2d00, 0xd, &(0x7f00000000c0)=""/214) [ 1168.755715] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000000000ff", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:58 executing program 1: semget$private(0x0, 0x4007, 0x900) 10:07:58 executing program 1: semget$private(0x0, 0x4007, 0xf401) 10:07:58 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x144, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:58 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000180)=0xc000000000000000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x400}, &(0x7f00000000c0)=0x8) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000100)={{0x2, 0x0, 0x1, 0x3, 0x4}, 0x2, 0x2000000000000000}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={r1, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}}, 0x3, 0x0, 0x401, 0x8, 0x96}, &(0x7f00000001c0)=0x145) semget$private(0x0, 0x4007, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100, 0x80001) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000040)={0xa, 0x7, 0x931, 0x4}, 0xa) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0xffb, 0x44e00) [ 1168.845814] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:58 executing program 0: semctl$GETALL(0x0, 0x8a01, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:58 executing program 1: semget$private(0x0, 0x4007, 0xdd00000000000000) 10:07:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:58 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1e1, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 0: semctl$GETALL(0x0, 0x14e, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x80) fallocate(r0, 0x1, 0x1f, 0x5) semget$private(0x0, 0x4007, 0x0) [ 1169.007837] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1169.042687] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:58 executing program 0: semctl$GETALL(0x0, 0x4301000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:58 executing program 1: semget$private(0x0, 0x4007, 0x1600000000000000) 10:07:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000004", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:58 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x186, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x90000, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000040)) 10:07:58 executing program 0: semctl$GETALL(0x0, 0xb301000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 1: semget$private(0x0, 0x4007, 0xfa010000) 10:07:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000007fffffe", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1169.227952] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:58 executing program 5: semget$private(0x0, 0x2, 0x1fffffdfd) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40200, 0x0) write$UHID_INPUT(r0, &(0x7f0000000040)={0x8, "3edb54a38e46e69b0aff5728608e0f6a2bc7c500986ee698acc778449b42c88b647c30699345e58c315238cf9913e83d735ce61157f3263636d46b746cf1e6e07f019907b1a958c5f9d1fbb5aecff4bec341e83e0712511d395e0409a67a235d0cc6f2fecc3ea8c55aae67f3f586efc01a921b4b0869472d74cc2152ba3b068f6cb64a98dfdd395a15a3c8a299c402af3ddf19b7465ff4774820a3639884270777a5cd0fc56ba3668c668d5e351c8436349ae29c5ef3548c6bd310908c8c4e9555f573fcbaf02c0293cbe38fe5d1ba026f6b02994867925e9000d6b2afc0a65d601f837bb7745c00dfcc72fbfc2f9788b079a59a0be3bc07e958cb67ae54c8c0ee2b267516af99f912f1b2fe7b4c14457012ac0b58e8504ed6059da8268f66089148034fedf790935d123e37c431e088efce6b3c6bf81cb8ae3f71b711a03180bdcd6d360608d27559ecf6d9c503e73186825729d1db4fd5466d27663d73bc8183d42570cda15edb01625a991476cf93ef64197a410bf078c6d6388edc23ce3c68c9414366bb02c483c06a228c8b8a8e4509d241b4105b4a4542b959163b8a5135dd7d0efcca0bf0eb2e1b5edc613fd60ccf324eb2908a52c37ac9e47e114369a3a129077bf9d57cebee281e340029ae6f9b0a32d47347b1ee2fda491409af0fcc5ada7344c35655c83a9ae48ddcb5c5b36f7dd25a8257a5faac904e42a5f5e2170a81073824e159b9cd3488854372cec11577ba092e401dfc805f7513daa9140779fd0cacab3c39ae94074dae09f1e670140dddde5f0550af164812abe833283e8005368b1a810b688ad07e0cc5bf1bdc3f060d741084ab54484f00403c6a260cda26e66fb87759d59d9687f54ddee84949d5bddeb3390ba379a6f6dcdc01330f1fceadc0279822cbffa5d2a1c46042994fda98368cf23899ee34d613726c0a8fde1184ea0cd6541c40f768290bf94e931e1b84204ee8454ff037c2d800bf4b9cfeceff8c5b56e4012a6ebf6a6dd15dfcbeed3171c22649480d40e3593a909565ba34e90f0ecd5c55b7d2740d17b9edefe51120d2393a9f766c9e3269b5e32c6a817f423dfde9e40b880ac66ac7db2a7df9a7e0fa8cb14c2cc95dc014d3d9c8c4341131ab3531d3e9df0f4546cedd1880091345733e0acd398547b60d55675105f390c4523b5fe41c221245424370e4a2e41b101948226a6333f17ed3d585ad4702b41cbc0e09969d0646ca4d5482da38b8e67ecec0064d5f7346bc175b5670304c98c2b56f47971de2b06b27bc65f0027a5c3aa6dcdf47623cb6b672d2441e100785e1a108014b2490c7f9dafba4f28ce708e2603ae21cc243a735dbe68c7c22b88ee9257f29e9a7aa894c38a793aeb0b6790f0a7dd31cba39b84ae239aa3a273d0154ed7387a909b32fcd6ee4c9d59f38fbe8fa6b58139f0e11e8af9868eeca6cf40eebdd2925cd91cb7a94a88beffc9dcf31d3c750ac5ed56c88d7ae317fcca60122d9d0089d3b55e891c13e814863ce67e6a5f2e72002c429244ef5dea9725a7c5709ca94d307d369d592c31a1ac183c6ea46aae05991ac7055eb372688ef24eb5335fba1db3897bc76c245a447c2bebcbd4bfc2c0516fc7b5aa5f669895335c4922a0bf9b5e266c0f5c60841c7843d297621babff7ae66f45b535be5a47107b1e85427e748d132bac37c32ee215e1614faf125b35594739108364422b0cdb2ce789ad893b7ba58ca9c83baced5c6f7766c9c5f8acc624ea0652839dba2ce7f643937a3a09f1c5f0b5a0f437c448901d638e0dfab20973e8a4340dbee58b4b0bde6f5d1bf745497763af4a8e6fc0ce6f1155cd42379160553a37a54f427edca9c5c8c29ac51d6cc94d7f6a90b2e3eb9d772e4ff1951aa7c3841cc51d4e70297b877f4734f3cd7d438363b07e2ce8f847b4f9044690a40a606d28a76ef859b40c503e82f8eebe19b72db1dc761a3829605e6e0e748cea59558d0499b0d687cd4f068f37ccf15e52641c229820fe993677b38d134d8323a291dcd4a2d5a47bb15017bb2809edb19c0ab369fc44087888c18cb3076924b7cc3b18e9802df35231233d109fbbb515cda3ede5db81f5a69b3319d38a025f22a0014e1f7da2afe225eba2bdce4f7a7ae12bac8228e2add1d2bb90a1517eb02dbd3167e2c54628c4b0fe37740e22bcfb15f38643fe4cd7a40bc931d20d7ed82b7fbcd5221802509b59bcf169486bdcb239f518b4b0e02a5de67daa7d96046668a8f177610a0e3326b3f0ec5e66ba92304da49a7269527731ffe80b3e24c87ee4be8bde7cfa4f6ad3b8393672cba6a379b0b209b7b1565eb236b7198cb38dbedc04e2449894e462e4a84b9deb6e98483238d27190fcbe47137e4ba965adb9cd2d90e4b90b7072b824410be84026507e006a3ffaf9165471bca81ff482592da30888a15966ec54c2fac74df4ec7d252cae3383974d33d4aa2f4e0d07ecd3501d24dd835e4d4c64273902e465ba831560859ebf5dbea38a1af3b4bd5dbe59bdba50ea36e0e2407329ce5cf130d32fc5fbc35969692b01b75c0a2600ad59cf438bf4342676ea961949b2d0e352df6b48fa8da8298500cf056eb012b086c761f52201ac3057ac527b1d12442a0114b79ff62c696e926b98ce46d344278eea4918c41628e1d898215eedb24dce47584a2c1dc86c123b18fb5a003932c98ef3b5033803cefaf9bef6f3d53b6c0c7fec2778ab2ba55251af2957c84e822f79dded03a2fff5ccff46ae4b2e709ef5bae0aaa1774a7124586989ad5bb07c05f4fc86c7048860d768a2680ebe35b8f85e877b47dbccbfb65335dd069cec6b15ac0350fa0f7603b09830fe1a5c676e548c4fb9d4ae6f98f9a5e66e4b0d5da0c66188f8164903276b9400844805cc43dc7875c8477f466bad90ed3658fba28fe9a4484c447dc7fe6242f95905098d2d63113d0584594998220c526c8bbfd4f5eab6dce1ca7baa8ef648f2a37ee7849bb57e4506dc70133d48c2708f004cefcdd4cb528367bda36dd15167a1b19307d18bab8d0cf613da09af35c6d50902f98b7fa054d722478d853144432b5be569e62432c75f91b561f8e7bfba9f2151cba9068a05e08de1542d1cb36bbd6c8e8c4f6e7dd0988f43f094904f5899257d1e589a33dfb9299625c64f9142b8e47103e9a288c0a32a30c53a7a8f1a08b6c0e4ecd28502153a13e0af045ee81a4feb3527f9011a9ba93c4848755194ef452dcab307ca39f986f24f5441f52669266f4e59890697e97626a3431264aa64f5f4addc486ed1937b4007e7b5048d31f943b2f084c6116d68f2b15b95bf86cdf324579a254fe48d12b926dcf66f58b683b4c2c95b9549e242400a59eca4ec8cce62ac41f963d802c13d5a4a2e3b12e3b8cea9d10eb7eb288f3b171cd70c631efdbbc9088ed57ac088ea57f08099cbd02ecbd3dcde5f0b9dd1afffb70a4203488a0bf81a7cfb94cc819351a240940225ac3395e5aa2b31a5e6ba5ab2bf785c2a043fc2b3ce48b6f96c956ce26d2860b786e7caecaff28e0bc6e1f24801589cacc92db3dd68963dc3db3e0fb03429761dddf22ce16cceac8ab065b93300b3784fe28e6d5491d6fe2e3e99321547cbffd01db5bcc06df864db60c16363bcbb7ec3c4d6db545e859d5eedfe977aabb4ccb9133bbda63acfda197f380fbe4afae183dee5aed8ac88271b7ceef661e3c6bd912a6a92ac167509c93b82421072dcdd93b3e155892ad49d603b556775edfd2924828aa688ca7f3c1f820798f7eb0b616bdf6b4e838546f43fa65739896fc05568188ae92c29bbdaff19d28289fce306479003b1be93bb30c6098c3ee5fffce572301ea7ad98b1f2713c94c0aa74c12302729c016ab10caea9639a183c14172a1dbd0c114e5f5b55bd0d46af1c1833fd79ba70733a8cf4d9a0535467239c5483e8922313d8003ff5cf794d26e77feec8a76f99ab337b62bf3a7c0482c5f66c60e4ce6eddcbc2726f7d723f2dc254a065255d3c1e57044da18e619697a3050f645334c8c07ddd1f28c79fb3390209c5bd837a0828802b3cd5143d6fe7140d3305317f041da7d9b713c047c5377bb388b5f2cef51d9a66506e80bb8ae69405993603f3024aee9fc2be1386ee9889da98622f293066fee79c12a76f89ff5e0c683d6abf925bc35996b46d2257a2cf38e69e489c60151e7c1e48fda840af88f945999a0c52cd1d53edad830603e62b9aec89b3e4ec60911160c4b3ae86deeed587a4dbd11c7d0022ac253dd47aa6ef38773627c986149023ca1bdea765373fb5e4041c358e5d51898892bb50430b61659fad0de48a4d80c3950c7762caff778b720474daf58f555ead1895e4d6c7424e429675149122ac14896bdc02df119aeac557ec0d1818ce498249787053ee990ba1ac2d80e8a639141ad2f3f5af737d3b8fd39b85a6f9854ed7c78589f6a2e7c78572e7cfec58bf7ec7e5526989da7f37b358c3b88bc57b92db2bdf422efe934f845d0aeade5699643d21ac121e69444ea741756ad6d691bec1b581ef7f483a48fdfc0c405e6af85b80a2214c18c98695e687b8b32f1c3b8375d7847ffa611255d6e95d7b51ebf7e1e14dd8d87d89d418b4010c3e9b652b105d7046cb378eb9ea46f384371faff24726dbcb850df416bf9def4ea2b2a23e4bfec935a129ef3412bc3ba41fe74ce10cca5e9c379f290b6e5b11dd2c9c37d642c616391c33656438ae848700dc6040520d467c200d02db696850538125ef71f76a367912b1fb29dee83f025c705295c323329cccd7877aed9f8a4e4094c0a66909ea5c412c86e35c0427433520da64f7fe02439a1ccc9944387a31569da82b21ee355781974c3f1f9cd8a60fc6e2c9b944699d75e9c1f3a2b3e791d3ab4c23a88d04c15f4b20630a0c3abb8d835701de93e5e2f1c683556d4e2f7b106e0644bf7f40f9f673847d1f5bd956bdc0c9828be1f6831f568e76bb9bdadc5fb6407bbaaff4d4b770f7546c7ae32a4ca58a5cc72304efd0ca958b2227a1a31682e2f9890b840e2327dd2cfd5de67bbec7c11e4c94ec718650a2e889ac4637f6dcf490ceaa5d64a01dbab3e7e80f06c99d2d59370789b4cfeb124afbed7a55937ddc92ec873b2ae6d6fc4b529f8029d995c6034c1338ddde59e1a10de3046480b9c1dc2e55de92dfd838fd1a9aad7ec88e25943b65714d1730a402656078f248c47629120083f71a515f0adbdabd9ec27939bca49dba4836932236f46778e5be18953c5c02bcd9f15472dd955ed1688a79e4603e8b810a60d2b85be2ed97b0627708a5e9a6296fe994ae5aeae035ef57791d750c94c1ba83d0f2cc30682f81e2734c5c5da7b148a20df9ddfb1896c5bab65fa4b8dc5c06e310c5360badf04e011347391e7ca4e46f28f4de792e33f201818b4e7a3b3cd026ecbe7313851699aadaf3548424296c6be76308bf6309c199e2d4e6821c8335d229e1c377f8e44d922ec83db6b75e44fc4ea50c81ef61b175437023b9c852c028eaedabd941ee32dc7bd401f20548ea07cd8df46d3987145bddaadea68cf2162208e3a7483c67ca0b0064686a41ae9d708c94ecb0e9e789deb904d836587cb3f42d3cc8733c2e3ec4a1fb3126eb06ccfa31cd011f3379d55600be585f9e9f89a188df606d2f9d220d5b105d6a28d7c226e7b614500a30dce13cec00a3ebe9b37ca62df29355118c7cff944f5341ec5341c0000259191e2f58c53d0590c745372274019c81d2ba6a7106e9f821bd9dbb520383cf3236697dd1582525dcf46f96bae28e622c9899446007c", 0x1000}, 0x1006) semget$private(0x0, 0x3, 0x4) accept$inet(r0, &(0x7f0000001080)={0x2, 0x0, @rand_addr}, &(0x7f00000010c0)=0x10) 10:07:58 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa901000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 1: semget$private(0x0, 0x4007, 0xb000000) 10:07:58 executing program 0: semctl$GETALL(0x0, 0xc2000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000003", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:58 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc201, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 1: semget$private(0x0, 0x4007, 0x3400) 10:07:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1169.409035] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1169.429912] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:58 executing program 0: semctl$GETALL(0x0, 0xb001000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 5: semget$private(0x0, 0x4007, 0x30) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x5, 0x5, 0x7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0xec, 0x80000000, 0x1bed, 0x800, 0x100000001}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={r2, 0x7fff, 0x6, [0x5, 0x100, 0x1, 0x400, 0x91e, 0x5]}, 0x14) setsockopt(r0, 0x8, 0x5, &(0x7f0000000340)="c48dd0d8a22f674070479d20ecc37fdf199085d91368ba551a6eb534b44d455672883b2b80e8e1a6f66bcd9e6cbf4ea0e0ecbf664493b594d69525287e0cd8d7cc2cf8f85b8f446779a35ee7ebe37a6b0bb2707c35936bcc859374b500a1fd77f076be29dd46b6c0f89fc3", 0x6b) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'veth1_to_bond\x00', {0x2, 0x4e20, @loopback}}) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) 10:07:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000001", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:58 executing program 1: semget$private(0x0, 0x4007, 0x13) 10:07:58 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa000, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1169.589137] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:58 executing program 0: semctl$GETALL(0x0, 0x136, 0xd, &(0x7f00000000c0)=""/214) 10:07:58 executing program 1: semget$private(0x0, 0x4007, 0x35) 10:07:58 executing program 1: semget$private(0x0, 0x4007, 0x6101) [ 1169.690010] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000400200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:58 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4901, 0xd, &(0x7f00000000c0)=""/214) [ 1169.809019] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:07:59 executing program 0: semctl$GETALL(0x0, 0x8801000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:59 executing program 1: semget$private(0x0, 0x4007, 0xf0) 10:07:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:59 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = dup(0xffffffffffffff9c) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = socket$inet6(0xa, 0xfffffffffffffffe, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) recvmsg(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/150, 0x96}], 0x1, &(0x7f00000002c0)=""/198, 0xc6}, 0x2140) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_logger_exec_t:s0\x00', 0x2b, 0x2) lseek(r0, 0x0, 0x7) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x7, 0xfffffffffffffde2) 10:07:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:59 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6e00, 0xd, &(0x7f00000000c0)=""/214) 10:07:59 executing program 0: semctl$GETALL(0x0, 0x175, 0xd, &(0x7f00000000c0)=""/214) 10:07:59 executing program 1: semget$private(0x0, 0x4007, 0x160) 10:07:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:59 executing program 5: semget$private(0x0, 0x4007, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8001, 0x108) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x1, r1}) 10:07:59 executing program 1: semget$private(0x0, 0x4007, 0x162) 10:07:59 executing program 0: semctl$GETALL(0x0, 0x6000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:59 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x600, 0xd, &(0x7f00000000c0)=""/214) 10:07:59 executing program 0: semctl$GETALL(0x0, 0xfe000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:07:59 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200000, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000040)=[{}, {}], 0x0, [{}, {}]}, 0x98) 10:07:59 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3700, 0xd, &(0x7f00000000c0)=""/214) 10:07:59 executing program 0: semctl$GETALL(0x0, 0x58000000, 0xd, &(0x7f00000000c0)=""/214) 10:07:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:59 executing program 1: semget$private(0x0, 0x4007, 0x3900000000000000) 10:07:59 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8e, 0xd, &(0x7f00000000c0)=""/214) 10:07:59 executing program 1: semget$private(0x0, 0x4007, 0xf701000000000000) 10:07:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:07:59 executing program 0: semctl$GETALL(0x0, 0x2d01, 0xd, &(0x7f00000000c0)=""/214) 10:07:59 executing program 5: semget$private(0x0, 0x3, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'veth0_to_team\x00', 0x2}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x110, r1, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xf0b5}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x804}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x81}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9e95}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 10:07:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1170.773656] QAT: Invalid ioctl 10:07:59 executing program 0: semctl$GETALL(0x0, 0xac01, 0xd, &(0x7f00000000c0)=""/214) [ 1170.805524] QAT: Invalid ioctl [ 1170.918511] IPVS: ftp: loaded support on port[0] = 21 [ 1170.998039] device bridge_slave_1 left promiscuous mode [ 1171.003566] bridge0: port 2(bridge_slave_1) entered disabled state [ 1171.058450] device bridge_slave_0 left promiscuous mode [ 1171.063893] bridge0: port 1(bridge_slave_0) entered disabled state [ 1171.128506] team0 (unregistering): Port device team_slave_1 removed [ 1171.138701] team0 (unregistering): Port device team_slave_0 removed [ 1171.148656] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1171.202178] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1171.267989] bond0 (unregistering): Released all slaves [ 1171.751918] bridge0: port 1(bridge_slave_0) entered blocking state [ 1171.758715] bridge0: port 1(bridge_slave_0) entered disabled state [ 1171.766022] device bridge_slave_0 entered promiscuous mode [ 1171.809295] bridge0: port 2(bridge_slave_1) entered blocking state [ 1171.815751] bridge0: port 2(bridge_slave_1) entered disabled state [ 1171.823675] device bridge_slave_1 entered promiscuous mode [ 1171.866186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1171.907238] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1172.032964] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1172.079700] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1172.282801] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1172.290594] team0: Port device team_slave_0 added [ 1172.331318] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1172.338980] team0: Port device team_slave_1 added [ 1172.381664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1172.429289] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1172.472973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1172.514356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1172.521930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1172.529873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1172.848930] bridge0: port 2(bridge_slave_1) entered blocking state [ 1172.855301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1172.861947] bridge0: port 1(bridge_slave_0) entered blocking state [ 1172.868302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1172.875539] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1173.538930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1173.742700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1173.824475] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1173.911329] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1173.917757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1173.924691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1174.015661] 8021q: adding VLAN 0 to HW filter on device team0 10:08:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:03 executing program 1: semget$private(0x0, 0x4007, 0xf7010000) 10:08:03 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5700000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:03 executing program 5: semget$private(0x0, 0x4009, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) 10:08:03 executing program 0: semctl$GETALL(0x0, 0x15e, 0xd, &(0x7f00000000c0)=""/214) 10:08:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1174.544459] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1174.580555] xt_check_target: 25 callbacks suppressed 10:08:03 executing program 0: semctl$GETALL(0x0, 0x1b, 0xd, &(0x7f00000000c0)=""/214) 10:08:03 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xbd00000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1174.580570] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1174.611373] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:03 executing program 5: semget$private(0x0, 0x2, 0x8) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x82, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)=0xf1a2) 10:08:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:03 executing program 1: semget$private(0x0, 0x4007, 0x500) [ 1174.652701] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:03 executing program 0: semctl$GETALL(0x0, 0xa00, 0xd, &(0x7f00000000c0)=""/214) [ 1174.712802] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1174.749217] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:03 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x82000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:03 executing program 5: semget$private(0x0, 0x4007, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x141001) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 10:08:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:04 executing program 1: semget$private(0x0, 0x4007, 0x3a00) 10:08:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:04 executing program 0: semctl$GETALL(0x0, 0x168, 0xd, &(0x7f00000000c0)=""/214) 10:08:04 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x8a00, 0xd, &(0x7f00000000c0)=""/214) [ 1174.891198] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1174.918502] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:04 executing program 1: semget$private(0x0, 0x4007, 0xdc00) 10:08:04 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000080)='rose0\x00', 0xb46}) fsetxattr(r0, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f0000000040)=')em0user\x00', 0x9, 0x1) semget$private(0x0, 0x4007, 0x0) 10:08:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:04 executing program 0: semctl$GETALL(0x0, 0xca00000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1174.951291] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:04 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1f1, 0xd, &(0x7f00000000c0)=""/214) 10:08:04 executing program 1: semget$private(0x0, 0x4007, 0x7) 10:08:04 executing program 0: semctl$GETALL(0x0, 0xab000000, 0xd, &(0x7f00000000c0)=""/214) [ 1175.075602] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1175.098874] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:04 executing program 0: semctl$GETALL(0x0, 0xa2000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:04 executing program 5: semget$private(0x0, 0x4003, 0x41) [ 1175.139231] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000002", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:04 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x28000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:04 executing program 1: semget$private(0x0, 0x4007, 0x9) 10:08:04 executing program 5: semget$private(0x0, 0x4, 0x160) 10:08:04 executing program 0: semctl$GETALL(0x0, 0x6f01, 0xd, &(0x7f00000000c0)=""/214) 10:08:04 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xed010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:04 executing program 1: semget$private(0x0, 0x4007, 0x15) [ 1175.302135] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1175.327146] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:04 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ptrace$peekuser(0x3, r0, 0x8) semget$private(0x0, 0x4007, 0x0) 10:08:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000ffffffff", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:04 executing program 0: semctl$GETALL(0x0, 0x8d, 0xd, &(0x7f00000000c0)=""/214) [ 1175.369364] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:04 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf801, 0xd, &(0x7f00000000c0)=""/214) 10:08:04 executing program 1: semget$private(0x0, 0x4007, 0xde00000000000000) 10:08:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1175.476743] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1175.493347] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:04 executing program 0: semctl$GETALL(0x0, 0xee000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:04 executing program 5: r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'yam0\x00', r1}) semget$private(0x0, 0x4, 0x0) 10:08:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000006", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:04 executing program 1: semget$private(0x0, 0x4007, 0xa00000000000000) 10:08:04 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa601, 0xd, &(0x7f00000000c0)=""/214) [ 1175.585838] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:04 executing program 0: semctl$GETALL(0x0, 0x7f00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1175.645881] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1175.670101] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:04 executing program 1: semget$private(0x0, 0x4007, 0x39000000) 10:08:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:04 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040)=""/130, &(0x7f0000000100)=0x82) 10:08:04 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb1010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:04 executing program 0: semctl$GETALL(0x0, 0xc1010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:05 executing program 1: semget$private(0x0, 0x4007, 0x36000000) [ 1175.785712] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1175.816700] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:05 executing program 1: semget$private(0x0, 0x4007, 0x1500) [ 1175.879633] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:05 executing program 0: semctl$GETALL(0x0, 0x182, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:05 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3a00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 5: r0 = semget$private(0x0, 0x4007, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000000)=""/253) 10:08:05 executing program 0: semctl$GETALL(0x0, 0x1700000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1175.994094] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:05 executing program 1: semget$private(0x0, 0x4007, 0x700) 10:08:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:05 executing program 5: semget$private(0x0, 0x4003, 0x200) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x401, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000040)) 10:08:05 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xda00000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1176.068103] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1176.095055] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1176.151600] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:05 executing program 1: semget$private(0x0, 0x4007, 0x1200000000000000) 10:08:05 executing program 0: semctl$GETALL(0x0, 0xeb00, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xcf01, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000ffffffff", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1176.237833] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:05 executing program 5: semget$private(0x0, 0x4007, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() fstat(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000540)=0x0, &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000680)={{}, {0x1, 0x5}, [{0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x4, r1}, {0x8, 0x7, r2}, {0x8, 0x1, r3}, {0x8, 0x7, r4}, {0x8, 0x2, r5}, {0x8, 0x4, r6}, {0x8, 0x2, r7}, {0x8, 0x2, r8}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x1) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) 10:08:05 executing program 1: semget$private(0x0, 0x4007, 0xda000000) 10:08:05 executing program 0: semctl$GETALL(0x0, 0x7c, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x301000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000007fffffff", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:05 executing program 0: semctl$GETALL(0x0, 0x36000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000138", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:05 executing program 1: semget$private(0x0, 0x4007, 0x62010000) [ 1176.404409] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:05 executing program 5: link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x7, 0x40) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000140)={{0x3, 0x81}, 'port1\x00', 0x91, 0x20000, 0x919d, 0x80000001, 0x200000000, 0x200, 0x6, 0x0, 0x6, 0x9}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8200, 0x0) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0xffffffffffffff1b, 0xfffffffffffffffe, 0x4, {0x200000000000009}}, 0x35ad1dca2eb8e120) 10:08:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000240", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:05 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3900000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 0: semctl$GETALL(0x0, 0x91010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 1: semget$private(0x0, 0x4007, 0xa000000) 10:08:05 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x1) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x6, 0x4) 10:08:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000002", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1176.568900] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1176.603955] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:05 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x85000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 0: semctl$GETALL(0x0, 0x6001, 0xd, &(0x7f00000000c0)=""/214) 10:08:05 executing program 1: semget$private(0x0, 0x4007, 0xdb00) [ 1176.699564] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0x10003, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0xfffffffffffffffc, 0x82, 0xfff, @buffer={0x0, 0xc0, &(0x7f0000000040)=""/192}, &(0x7f0000000100)="52a28b37c64e7b84e32a3db3d7f08f3ebe4952ead229048979b1b9f03e0abff4f5bbd760fe831bb035e157265efc97b96973f507dd7ed02f7e5e1d27e8e86b2e54ffe625c1400ccca5026279147dc28115f4c7eef919aa08a353122927779ab7ea2757d6ba7aaf435c46f3a4da2c544f494da3ebef3885886cfcba3eb68a329d6fba", &(0x7f00000001c0)=""/65, 0xffffffff, 0x20, 0x3, &(0x7f0000000240)}) semget$private(0x0, 0x2, 0xce98557de6f7d2f3) 10:08:05 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xe4010000, 0xd, &(0x7f00000000c0)=""/214) [ 1176.755122] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000004", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:06 executing program 1: semget$private(0x0, 0x4007, 0xde) 10:08:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:06 executing program 0: semctl$GETALL(0x0, 0xdf010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:06 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = memfd_create(&(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', 0x3) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x1) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000100)={0xfffffffffffffffb, 0x100000000, 0x5, 0x0, 0x401, 0x2}) [ 1176.887866] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:06 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1a00, 0xd, &(0x7f00000000c0)=""/214) 10:08:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:06 executing program 0: semctl$GETALL(0x0, 0x1a00, 0xd, &(0x7f00000000c0)=""/214) 10:08:06 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x164, 0xd, &(0x7f00000000c0)=""/214) 10:08:06 executing program 1: semget$private(0x0, 0x4007, 0x8) [ 1176.985715] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000feffff0700", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:06 executing program 5: semget$private(0x0, 0x4007, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) 10:08:06 executing program 0: semctl$GETALL(0x0, 0x3400, 0xd, &(0x7f00000000c0)=""/214) 10:08:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:06 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7b000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:06 executing program 1: semget$private(0x0, 0x4007, 0xf001000000000000) [ 1177.159205] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:06 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x48400, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x9) 10:08:06 executing program 0: semctl$GETALL(0x0, 0xad, 0xd, &(0x7f00000000c0)=""/214) 10:08:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:06 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3600, 0xd, &(0x7f00000000c0)=""/214) [ 1177.261992] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:06 executing program 1: semget$private(0x0, 0x4007, 0x300) 10:08:06 executing program 0: semctl$GETALL(0x0, 0x7500000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:06 executing program 5: r0 = request_key(&(0x7f0000001080)='rxrpc_s\x00', &(0x7f00000010c0)={'syz', 0x1}, &(0x7f0000001100)='@vboxnet0\x00', 0xfffffffffffffff8) add_key(&(0x7f0000001340)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="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", 0xffffffffffffff38, r0) semget$private(0x0, 0x3, 0x200) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001200)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000001240)={0x6}) semget$private(0x0, 0x200000004007, 0x4) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000012c0)={{0x2f, @local, 0x4e20, 0x0, 'nq\x00', 0x8, 0x7677, 0x6b}, {@local, 0x4e21, 0x2, 0x80c, 0x0, 0x7ff}}, 0x44) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000001380)={0x101, 0x2, 0x8000, 0x80000001, 0xe716, 0x7}) r2 = syz_open_dev$midi(&(0x7f0000001280)='/dev/midi#\x00', 0xffffffffffffffff, 0x101201) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000001180)={0xc06c, 0x332000000, 0x1c2}) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000001140)={0x1ff, 0x5, 0xd59, 0x80000000, 0x6db9, 0x80000000}) 10:08:06 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x10b, 0xd, &(0x7f00000000c0)=""/214) 10:08:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1177.419180] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000feffff0700", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:06 executing program 1: semget$private(0x0, 0x4007, 0xfa01) 10:08:06 executing program 0: semctl$GETALL(0x0, 0xff00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000100", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:06 executing program 0: semctl$GETALL(0x0, 0xf300, 0xd, &(0x7f00000000c0)=""/214) [ 1177.592294] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:06 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xfc01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:06 executing program 5: semget$private(0x0, 0x0, 0x4) [ 1177.649872] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000001", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:06 executing program 1: semget$private(0x0, 0x4007, 0x1700) 10:08:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:06 executing program 0: semctl$GETALL(0x0, 0xb3, 0xd, &(0x7f00000000c0)=""/214) [ 1177.775449] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:07 executing program 5: semget$private(0x0, 0x8000000000800003, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 10:08:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000007fffffe", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:07 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7f01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000007fffffe00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:07 executing program 1: semget$private(0x0, 0x4007, 0x4) 10:08:07 executing program 0: semctl$GETALL(0x0, 0xc7, 0xd, &(0x7f00000000c0)=""/214) [ 1177.979520] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000005", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:07 executing program 5: r0 = semget$private(0x0, 0x400b, 0x0) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000000)=""/30) 10:08:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:07 executing program 0: semctl$GETALL(0x0, 0xaa000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:07 executing program 1: semget$private(0x0, 0x4007, 0xdf) 10:08:07 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb3000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1178.175988] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:07 executing program 0: semctl$GETALL(0x0, 0x3c00, 0xd, &(0x7f00000000c0)=""/214) 10:08:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000003", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:07 executing program 1: semget$private(0x0, 0x4007, 0x1800000000000000) 10:08:07 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x69000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1178.341309] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:07 executing program 0: semctl$GETALL(0x0, 0xc801000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:07 executing program 0: semctl$GETALL(0x0, 0x7001000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:07 executing program 1: semget$private(0x0, 0x4007, 0x6101000000000000) [ 1178.530095] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:07 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xad000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:07 executing program 5: openat$mixer(0xffffffffffffff9c, &(0x7f0000000840)='/dev/mixer\x00', 0x1, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x0, 0x100400) connect$pppoe(r0, &(0x7f0000000280)={0x18, 0x0, {0x0, @random="f84ff879e16c", 'ipddp0\x00'}}, 0x1e) semget$private(0x0, 0x4007, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000040)={0x18, 0xf, 0x2, {{0x0, 0x2, 0x4}, 0x6}}, 0x18) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000340)={{0x0, 0x1, 0x7ff, 0x0, 'syz1\x00', 0x7}, 0x1, [0x800, 0x1, 0x4, 0x0, 0x6ed, 0x1ff, 0x7fffffff, 0x7, 0xffff, 0x7, 0x5, 0x20, 0x0, 0x9, 0x7, 0x0, 0x100000001, 0x7ff, 0x80000000, 0xb7, 0x3f, 0x1, 0x8001, 0x7f, 0xf772, 0x7, 0x9, 0x3ff, 0x4, 0x7f, 0x40, 0xfffffffffffff7b4, 0xffffffffffffffe0, 0x2, 0x7fffffff, 0x3, 0x8, 0x79a, 0x8, 0x3fffc000000000, 0x7, 0x9, 0x100, 0x0, 0x4, 0x8, 0x1ff, 0x3, 0x4, 0x0, 0x718, 0x1, 0x9, 0x100, 0xe86, 0x1, 0x2, 0x1, 0xffffffffffffff8b, 0x1, 0x5, 0x1, 0x3, 0x10001, 0x80000001, 0x7ff, 0x9, 0xbe7, 0x3, 0x5, 0xe56c, 0x6, 0x101, 0x253, 0x8, 0x0, 0x5b20, 0x0, 0x4, 0x7, 0xfffffffffffffff8, 0x3ff, 0xc7, 0x1, 0x1, 0x8, 0x9, 0x0, 0x1, 0x8, 0x445, 0x101, 0x423, 0xfffffffffffffff8, 0x100000000, 0xffffffffffffff6e, 0x6, 0x7, 0x100000001, 0x101, 0x1000, 0x100000001, 0x3, 0xffffffffffffffff, 0x4, 0x81, 0x0, 0x3, 0x3, 0x1, 0x8, 0x4, 0x3, 0x1, 0x0, 0xffff, 0xfffffffffffffffc, 0x1780db26, 0xe46fe3e, 0x7, 0x2f6, 0x1, 0x4, 0x8144, 0x4416, 0x5, 0xd5, 0x8], {r2, r3+30000000}}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000002c0)={r0, r1}) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000000c0)="66a3adca66470c2297e389edce231433b23a7e3efafdf9e7ebad3a8cd1d0c0b3046e8b2fa917c1324b9432fefd7737b513d6499e26ec6a8ca574f6c75b6ec1ed5b3fb12c8998ed15df7b7f9d1286e755fb13", &(0x7f0000000140)="c40d8956be9279f6888f11fd0431da3686e7e16614aeb5f9a7178e279870bfd1fda83426a94343c18b73c12dd31df22ad6402bdae21b5a9dccc72dd7437a11afc2cc163f0f3abd8350153378a7bbdbf76520b505d00e9e5ac564d5231295f52cb005994790f2f7fa30cd42802e02b9a98f70857c99790b2f42f5bfb2a3ac7be98e6a714ab227a0f56d3ffafc47bebefdb6ee9504c5c8adf005d8", 0x52, 0x9a}) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000080)) 10:08:07 executing program 0: semctl$GETALL(0x0, 0x45000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:07 executing program 1: semget$private(0x0, 0x4007, 0x3a000000) [ 1178.654671] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:07 executing program 0: semctl$GETALL(0x0, 0xad010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000380100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:07 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xc0010000, 0xd, &(0x7f00000000c0)=""/214) [ 1178.865622] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:08 executing program 0: semctl$GETALL(0x0, 0x3700, 0xd, &(0x7f00000000c0)=""/214) 10:08:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:08 executing program 1: semget$private(0x0, 0x4007, 0x2000000) 10:08:08 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xee000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:08 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000040)={0x1, 0x81, 0x401, 0x0, [], [], [], 0x7, 0x3, 0x7, 0x8, "b03e47351e4d861604f65ff6b8b5eef3"}) semget$private(0x0, 0x4007, 0x0) 10:08:08 executing program 0: semctl$GETALL(0x0, 0x3801, 0xd, &(0x7f00000000c0)=""/214) [ 1179.027232] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000006", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:08 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9101, 0xd, &(0x7f00000000c0)=""/214) 10:08:08 executing program 1: semget$private(0x0, 0x4007, 0x4000000) 10:08:08 executing program 0: semctl$GETALL(0x0, 0x13e, 0xd, &(0x7f00000000c0)=""/214) 10:08:08 executing program 5: semget$private(0x0, 0x400005, 0x10000003) 10:08:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000007ffff", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1179.255589] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:08 executing program 0: semctl$GETALL(0x0, 0xac010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:08 executing program 1: semget$private(0x0, 0x4007, 0xdd00) 10:08:08 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd701000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:08 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x10001, 0x14080) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) semget$private(0x0, 0x4007, 0x0) 10:08:08 executing program 0: semctl$GETALL(0x0, 0x3201, 0xd, &(0x7f00000000c0)=""/214) [ 1179.474349] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:08 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb7, 0xd, &(0x7f00000000c0)=""/214) 10:08:08 executing program 5: semget$private(0x0, 0x4007, 0x0) alarm(0x7) 10:08:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:08 executing program 0: semctl$GETALL(0x0, 0x8b00, 0xd, &(0x7f00000000c0)=""/214) 10:08:08 executing program 1: semget$private(0x0, 0x4007, 0xdb) [ 1179.642675] xt_check_target: 23 callbacks suppressed [ 1179.642689] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1179.683525] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:08 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x53010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:08 executing program 0: semctl$GETALL(0x0, 0x116, 0xd, &(0x7f00000000c0)=""/214) 10:08:08 executing program 1: semget$private(0x0, 0x4007, 0xe00000000000000) [ 1179.783048] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000007fffffff", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:09 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa00, 0xd, &(0x7f00000000c0)=""/214) 10:08:09 executing program 0: semctl$GETALL(0x0, 0x16e, 0xd, &(0x7f00000000c0)=""/214) 10:08:09 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@rand_addr, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) r2 = getegid() write$FUSE_CREATE_OPEN(r0, &(0x7f0000000180)={0xa0, 0xffffffffffffffff, 0x6, {{0x6, 0x2, 0x2, 0xfffffffffffffffc, 0xc03, 0x4, {0x0, 0x4, 0x7, 0x6, 0x3f, 0xffffffff, 0xffffffffffff0001, 0xe0000000000, 0x3, 0xfffffffffffffffe, 0x0, r1, r2, 0x8000000000000000, 0x100000000}}, {0x0, 0x3}}}, 0xa0) semget$private(0x0, 0x4007, 0x0) [ 1179.950369] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1179.966944] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:09 executing program 1: semget$private(0x0, 0x4007, 0x8000000000000000) 10:08:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:09 executing program 0: semctl$GETALL(0x0, 0x19c, 0xd, &(0x7f00000000c0)=""/214) [ 1180.115255] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1180.154400] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:09 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6001, 0xd, &(0x7f00000000c0)=""/214) 10:08:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:09 executing program 1: semget$private(0x0, 0x4007, 0xd00000000000000) 10:08:09 executing program 5: semget$private(0x0, 0xfffffffffffffffc, 0x4000000000404) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @remote}}, 0x8, 0x7ff, 0xfffffffffffffffa, 0x1, 0x2}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x9a}, &(0x7f0000000200)=0x8) sendto$inet6(r0, &(0x7f0000000040)="a58431612d818987b2a1427b3641bf8a808e6425b49001a94972fe245686299adb201b6a09dcf65b7247813c189f0763630cbeaaf7b171bc", 0x38, 0x4, &(0x7f0000000080)={0xa, 0x4e20, 0x89, @mcast2, 0x3}, 0x1c) 10:08:09 executing program 0: semctl$GETALL(0x0, 0x1cc, 0xd, &(0x7f00000000c0)=""/214) 10:08:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000007fffffff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1180.308044] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:09 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa1, 0xd, &(0x7f00000000c0)=""/214) 10:08:09 executing program 0: semctl$GETALL(0x0, 0xbd000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1180.400467] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:09 executing program 1: semget$private(0x0, 0x4007, 0x300000000000000) 10:08:09 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7fffffff, 0x802) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00aa3019192370b5ec3ba26fb7356ec59083d7c8594823924408a574efd10c6a586732501492c93a947cd0da580654f81071c60f15a500f7b708f609cdf4c00f3bc339fc", @ANYRES16=r1, @ANYBLOB="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"], 0x1e4}, 0x1, 0x0, 0x0, 0x8000}, 0x4000080) semget$private(0x0, 0x4007, 0x0) 10:08:09 executing program 0: semctl$GETALL(0x0, 0xda000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:09 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1c1, 0xd, &(0x7f00000000c0)=""/214) [ 1180.611512] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:09 executing program 0: semctl$GETALL(0x0, 0xfc00, 0xd, &(0x7f00000000c0)=""/214) 10:08:09 executing program 1: semget$private(0x0, 0x4007, 0x6201) 10:08:09 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x14010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:10 executing program 0: semctl$GETALL(0x0, 0x5901, 0xd, &(0x7f00000000c0)=""/214) 10:08:10 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x11, r1, 0x1, 0x6}, 0x14) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r2, 0x100, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x50e1}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x2f79}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100000001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x40000) [ 1180.867961] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:10 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x2a, 0xd, &(0x7f00000000c0)=""/214) 10:08:10 executing program 1: semget$private(0x0, 0x4007, 0x36) 10:08:10 executing program 0: semctl$GETALL(0x0, 0x1b3, 0xd, &(0x7f00000000c0)=""/214) 10:08:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:10 executing program 5: r0 = semget(0x2, 0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x101400, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000380), 0x2) getresgid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) r4 = geteuid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000002c0)={{0x0, r1, r3, r4, r5, 0x4d, 0x58a}, 0x80000000, 0x0, 0x2}) semget$private(0x0, 0x4007, 0x0) 10:08:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:10 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xbf01000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1181.422062] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:10 executing program 0: semctl$GETALL(0x0, 0xa0, 0xd, &(0x7f00000000c0)=""/214) 10:08:10 executing program 1: semget$private(0x0, 0x4007, 0xb00000000000000) 10:08:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:10 executing program 1: semget$private(0x0, 0x4007, 0x4000000000000) 10:08:10 executing program 0: semctl$GETALL(0x0, 0x6000, 0xd, &(0x7f00000000c0)=""/214) 10:08:10 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x4a01000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1181.740165] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1181.788880] IPVS: ftp: loaded support on port[0] = 21 [ 1181.880889] device bridge_slave_1 left promiscuous mode [ 1181.886426] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.917984] device bridge_slave_0 left promiscuous mode [ 1181.923407] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.996218] team0 (unregistering): Port device team_slave_1 removed [ 1182.010123] team0 (unregistering): Port device team_slave_0 removed [ 1182.019688] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1182.050730] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1182.126102] bond0 (unregistering): Released all slaves [ 1183.096915] bridge0: port 1(bridge_slave_0) entered blocking state [ 1183.103478] bridge0: port 1(bridge_slave_0) entered disabled state [ 1183.111143] device bridge_slave_0 entered promiscuous mode [ 1183.151909] bridge0: port 2(bridge_slave_1) entered blocking state [ 1183.158445] bridge0: port 2(bridge_slave_1) entered disabled state [ 1183.170599] device bridge_slave_1 entered promiscuous mode [ 1183.205471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1183.238715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1183.345592] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1183.373426] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1183.401137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1183.407995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1183.434659] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1183.441684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1183.550095] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1183.557147] team0: Port device team_slave_0 added [ 1183.581152] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1183.588431] team0: Port device team_slave_1 added [ 1183.613199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1183.639449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1183.665079] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1183.672412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1183.680960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1183.702820] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1183.709872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1183.718815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1183.953159] bridge0: port 2(bridge_slave_1) entered blocking state [ 1183.959702] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1183.966352] bridge0: port 1(bridge_slave_0) entered blocking state [ 1183.972730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1183.979981] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1184.327423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1184.845468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1184.926835] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1185.006311] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1185.012956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1185.020338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1185.105657] 8021q: adding VLAN 0 to HW filter on device team0 10:08:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000140)=0x4, 0x2) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f00000000c0)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000380)={@local, r1}, 0x14) semget$private(0x0, 0x4007, 0x4) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x800, 0x8, 0x31, &(0x7f0000000180)="c969080c59c0bef8c2a538ebf4083a44e8ec3548a9f14530fbe6a5530bbe56c37d4f1424d90aca3c9b7b3b9738d38bf7e0"}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x56, "0fde0202265ee746c02c358055b53fea9db8e4f3560a384df846d4b5fdb021d39c97a57bc3c9859dc07d8c5b30da91c4624b3f361f88d8cc0b92c336f9cfa3496eb6b38b627c826d1fb464adcec0193ac9b238cb29ff"}, &(0x7f0000000280)=0x5e) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e22, 0xffffffffffffffff, @empty, 0x7fffffff}}, 0x2, 0x7}, 0x90) 10:08:14 executing program 0: semctl$GETALL(0x0, 0xaf01, 0xd, &(0x7f00000000c0)=""/214) 10:08:14 executing program 1: semget$private(0x0, 0x4007, 0xd00) 10:08:14 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xa501, 0xd, &(0x7f00000000c0)=""/214) 10:08:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1185.699451] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1185.706008] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:14 executing program 1: semget$private(0x0, 0x4007, 0xfffffffffffffffe) 10:08:14 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7c, 0xd, &(0x7f00000000c0)=""/214) 10:08:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:15 executing program 0: semctl$GETALL(0x0, 0x14c, 0xd, &(0x7f00000000c0)=""/214) [ 1185.906880] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1185.922332] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:15 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f0000000040), &(0x7f0000000080)=0x4) 10:08:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:15 executing program 0: semctl$GETALL(0x0, 0x4601000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:15 executing program 1: semget$private(0x0, 0x4007, 0x34) 10:08:15 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x7, 0xd, &(0x7f00000000c0)=""/214) 10:08:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1185.993230] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:15 executing program 5: semget$private(0x0, 0x4007, 0x104) exit_group(0x3ff) 10:08:15 executing program 0: semctl$GETALL(0x0, 0xe0000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1186.100991] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1186.127892] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:15 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xbb, 0xd, &(0x7f00000000c0)=""/214) 10:08:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:15 executing program 1: semget$private(0x0, 0x4007, 0x163) 10:08:15 executing program 0: semctl$GETALL(0x0, 0xfa000000, 0xd, &(0x7f00000000c0)=""/214) [ 1186.296835] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:15 executing program 5: semget$private(0x0, 0x7, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) [ 1186.356781] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:15 executing program 0: semctl$GETALL(0x0, 0xff01, 0xd, &(0x7f00000000c0)=""/214) 10:08:15 executing program 1: semget$private(0x0, 0x4007, 0x34000000) 10:08:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000ff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:15 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x86010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000400200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:15 executing program 0: semctl$GETALL(0x0, 0x97, 0xd, &(0x7f00000000c0)=""/214) [ 1186.547986] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1186.559393] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1186.581627] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:15 executing program 1: semget$private(0x0, 0x4007, 0x8000000) 10:08:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:15 executing program 0: semctl$GETALL(0x0, 0xea01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:15 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x8000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xfffffffffffffd51) get_robust_list(r1, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f0000000180)={&(0x7f0000000140)}, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f00000002c0)=0x18) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000080)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000400)={0x2, 0x7, 0x3, 0x1, '\x00', 0x2}) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0x1ff, &(0x7f0000000340), 0x8) semget$private(0x0, 0x4007, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000300)={0xffffffff, 0x54d5}) r3 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x3f, 0x2) r4 = shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r4, 0x0) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000100)={&(0x7f0000ffa000/0x3000)=nil, 0x7f, 0x4, 0x4, &(0x7f0000ffd000/0x1000)=nil, 0x1f}) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0)={0x6, 0x5c, 0x0, 0x1}, 0x8) 10:08:15 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd5010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1186.721960] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1186.751117] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:16 executing program 0: semctl$GETALL(0x0, 0x1e00000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1186.847116] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1186.880973] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:16 executing program 1: semget$private(0x0, 0x4007, 0x1f7) 10:08:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000000001", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1186.901905] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:16 executing program 0: semctl$GETALL(0x0, 0x1e01, 0xd, &(0x7f00000000c0)=""/214) 10:08:16 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10d000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@mcast2}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x7fff, 0x0, 0x10001, 0x7fffffff}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f00000000c0)={r1, 0x1}) 10:08:16 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x13d, 0xd, &(0x7f00000000c0)=""/214) 10:08:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1187.004961] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000013800", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1187.090522] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:16 executing program 0: semctl$GETALL(0x0, 0x9c, 0xd, &(0x7f00000000c0)=""/214) 10:08:16 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3600000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:16 executing program 1: semget$private(0x0, 0x4007, 0xc) [ 1187.133518] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1187.149978] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:16 executing program 0: semctl$GETALL(0x0, 0x8901000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:16 executing program 5: r0 = semget(0x3, 0x3, 0x10) semctl$SEM_STAT(r0, 0x7, 0x12, &(0x7f0000000000)=""/4096) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000001500)={0x12, 0x5, 0xc, 0x1f, 0x8, 0x8001, 0x1, 0x139}) ioctl$KVM_RUN(r1, 0xae80, 0x0) semget$private(0x0, 0x3, 0x400) r2 = dup(0xffffffffffffff9c) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000002140)={"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"}) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000014c0)={0x0, 0x33, 0x4, 0xe, 0x3, 0x1, 0x4, 0x75}) ioctl$RTC_VL_CLR(r1, 0x7014) accept$unix(r2, &(0x7f0000001400), &(0x7f0000001480)=0x6e) [ 1187.256677] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:16 executing program 0: semctl$GETALL(0x0, 0xec000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:16 executing program 1: semget$private(0x0, 0x4007, 0x5000000) 10:08:16 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb200, 0xd, &(0x7f00000000c0)=""/214) [ 1187.343572] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:16 executing program 0: semctl$GETALL(0x0, 0x7f01, 0xd, &(0x7f00000000c0)=""/214) [ 1187.466793] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000feffff0700", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000007fffffe00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:16 executing program 5: semget$private(0x0, 0x4007, 0x80) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80000001, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x5, [0xd1, 0x2, 0x7, 0x2, 0x800]}, &(0x7f0000000080)=0xe) 10:08:16 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x2c01, 0xd, &(0x7f00000000c0)=""/214) 10:08:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:16 executing program 1: semget$private(0x0, 0x4007, 0x20000000) 10:08:16 executing program 0: semctl$GETALL(0x0, 0xf0, 0xd, &(0x7f00000000c0)=""/214) [ 1187.659082] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1187.730988] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:16 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xd401, 0xd, &(0x7f00000000c0)=""/214) 10:08:16 executing program 0: semctl$GETALL(0x0, 0xf0000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:17 executing program 1: semget$private(0x0, 0x4007, 0x3600) 10:08:17 executing program 0: semctl$GETALL(0x0, 0x2f, 0xd, &(0x7f00000000c0)=""/214) 10:08:17 executing program 5: semget$private(0x0, 0x4007, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x3000, 0x104000}) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) 10:08:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:17 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x2d01, 0xd, &(0x7f00000000c0)=""/214) 10:08:17 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x59, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) semget$private(0x0, 0x4007, 0x0) [ 1188.078545] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:17 executing program 0: semctl$GETALL(0x0, 0xc000, 0xd, &(0x7f00000000c0)=""/214) 10:08:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:17 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1c6, 0xd, &(0x7f00000000c0)=""/214) 10:08:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:17 executing program 1: semget$private(0x0, 0x4007, 0xf701) 10:08:17 executing program 5: rt_sigpending(&(0x7f0000000000), 0x8) semget$private(0x0, 0x2, 0x200) 10:08:17 executing program 0: semctl$GETALL(0x0, 0x4300000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1188.272013] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1188.280896] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e61740000000000000000000000000000000000000000000000000000ffffff", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1188.418482] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:17 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6401000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:17 executing program 5: r0 = semget$private(0x0, 0x1, 0x3fe) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000080)=""/103) 10:08:17 executing program 1: semget$private(0x0, 0x4007, 0xf00) 10:08:17 executing program 0: semctl$GETALL(0x0, 0x3601000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1188.512469] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:17 executing program 0: semctl$GETALL(0x0, 0xf7000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:17 executing program 5: 10:08:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:17 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x300000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:17 executing program 0: semctl$GETALL(0x0, 0x11b, 0xd, &(0x7f00000000c0)=""/214) 10:08:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000007fffff", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1188.711780] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:17 executing program 1: semget$private(0x0, 0x4007, 0x1400) 10:08:18 executing program 5: prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x800, 0x1004, 0x2, 0xa35e397}, {0x3ff, 0x3, 0x8, 0x4}]}) [ 1188.808079] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:18 executing program 0: semctl$GETALL(0x0, 0x194, 0xd, &(0x7f00000000c0)=""/214) 10:08:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000000002", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:18 executing program 5: r0 = semget$private(0x0, 0x3, 0x424) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/170) semget$private(0x0, 0x800004004, 0x200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x101000, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7, 0x33, 0x1}, 0x7) 10:08:18 executing program 0: semctl$GETALL(0x0, 0x6600000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:18 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3500000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:18 executing program 1: semget$private(0x0, 0x4007, 0x14) 10:08:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1188.993782] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:18 executing program 0: semctl$GETALL(0x0, 0xc010000, 0xd, &(0x7f00000000c0)=""/214) [ 1189.154408] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:18 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1df, 0xd, &(0x7f00000000c0)=""/214) 10:08:18 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x60000, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x8000, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="420f2261c7442400ac000000c744240297000000ff1c24c4e33d4a5b00250fae50800f01c8410f060f2062c4c2092c07c4810967a63944000066baf80cb89418fa8eef66bafc0cb8c7532eeeef", 0x4d}], 0x1, 0x1c, &(0x7f0000000140)=[@cstype0={0x4, 0x3}, @flags={0x3, 0x150000}], 0x2) semget$private(0x0, 0x1000004, 0x127) 10:08:18 executing program 1: semget$private(0x0, 0x4007, 0x17) 10:08:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1189.228715] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:18 executing program 0: semctl$GETALL(0x0, 0x66000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:18 executing program 5: semget$private(0x0, 0x4007, 0x0) semget$private(0x0, 0x0, 0x20) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) ioctl$TCFLSH(r0, 0x540b, 0xfffffffffffffff7) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) 10:08:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000000024000", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:18 executing program 1: semget$private(0x0, 0x4007, 0x700000000000000) 10:08:18 executing program 0: semctl$GETALL(0x0, 0x5300, 0xd, &(0x7f00000000c0)=""/214) 10:08:18 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1b1, 0xd, &(0x7f00000000c0)=""/214) 10:08:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e6174000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1189.540668] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:18 executing program 0: semctl$GETALL(0x0, 0xc701000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:18 executing program 1: semget$private(0x0, 0x4007, 0xf0ffffff) 10:08:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000ffffff", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1189.680666] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:18 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x11e, 0xd, &(0x7f00000000c0)=""/214) 10:08:18 executing program 0: semctl$GETALL(0x0, 0xb200000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:18 executing program 5: r0 = socket(0xb, 0x80000, 0x401) bind$alg(r0, &(0x7f0000001080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx2\x00'}, 0x58) semget$private(0x0, 0x4007, 0x0) unlink(&(0x7f0000001100)='./file0\x00') r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xc7, 0x101000) write$UHID_INPUT2(r1, &(0x7f0000000040)={0xc, 0x1000, "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"}, 0x1006) [ 1189.768213] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000500", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000400", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x3b01000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:19 executing program 1: semget$private(0x0, 0x4007, 0xb00) 10:08:19 executing program 0: semctl$GETALL(0x0, 0x8f01000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1189.934510] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1189.963952] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:19 executing program 0: semctl$GETALL(0x0, 0xaa010000, 0xd, &(0x7f00000000c0)=""/214) 10:08:19 executing program 1: semget$private(0x0, 0x4007, 0x4000000000000000) 10:08:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9201000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000feffff0700", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:19 executing program 0: semctl$GETALL(0x0, 0x8e00, 0xd, &(0x7f00000000c0)=""/214) 10:08:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xf2000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:19 executing program 1: semget$private(0x0, 0x4007, 0x3f00000000000000) [ 1190.320646] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:19 executing program 0: semctl$GETALL(0x0, 0xbe00, 0xd, &(0x7f00000000c0)=""/214) 10:08:19 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) semget$private(0x0, 0x4007, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={r1, 0x1, 0x6}, 0x10) memfd_create(&(0x7f0000000000)='/dev/sequencer\x00', 0x3) 10:08:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000600", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1190.467847] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:19 executing program 0: semctl$GETALL(0x0, 0x3a01, 0xd, &(0x7f00000000c0)=""/214) 10:08:19 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x6b01, 0xd, &(0x7f00000000c0)=""/214) 10:08:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000007ffff", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1190.523551] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:19 executing program 1: semget$private(0x0, 0x4007, 0xfd010000) 10:08:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000feffff0700", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:19 executing program 0: semctl$GETALL(0x0, 0x1e5, 0xd, &(0x7f00000000c0)=""/214) [ 1190.641700] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:19 executing program 5: semget$private(0x0, 0x4007, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) [ 1190.720505] xt_check_target: 20 callbacks suppressed [ 1190.720521] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:19 executing program 0: semctl$GETALL(0x0, 0x4a, 0xd, &(0x7f00000000c0)=""/214) 10:08:20 executing program 1: semget$private(0x0, 0x4007, 0x2000) [ 1190.783280] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x17b, 0xd, &(0x7f00000000c0)=""/214) 10:08:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:20 executing program 1: semget$private(0x0, 0x4007, 0xf301) 10:08:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000007fffffff00", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x1ab, 0xd, &(0x7f00000000c0)=""/214) [ 1190.976457] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1190.995177] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:20 executing program 0: semctl$GETALL(0x0, 0x18a, 0xd, &(0x7f00000000c0)=""/214) 10:08:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1191.113634] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:20 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = socket(0x7, 0x400000000000001, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="01000000010000000400000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0255e02cf7fa4f839570dbb94805811fa251"], 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20004004) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0xae, "0aa60bf290d5fe93695d3ef1b1ee7a1f3291cb198bdb0834576aff1fccf810d7e33f8b354495a3b4d69062f7c17c4a9d6cec50dab4239910b4625fcfc397f058a0b492e0e683f92423b56fdb9239d1ce255633a1c4516fb411f2ff18beb8fc1be1155b09be190735521d9fae0db4f771f9fbe4bf5c6e460ee05342c997c747c7fc85499621dabaf5379a3b263edc0bcd05ae04f7f9af65b924b4b1dc98db54dd7b53f3dc06ec35f80509d7cf7bff"}, &(0x7f0000000300)=0xb6) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c40000002c00200428bd70002f2bcdb500000000", @ANYRES32=r1, @ANYBLOB="09000d000700000003000800100001006d61746368616c6c0000000090000200080001000f00050008000100ffff03006c0002006800110000000c00010073696d706c6500002c000200180002000000000003000000060000000700000001040000080003002e000000080003007b00000028000600044cfb426471c6d8098f72d979ac4831a8f25efa14abc4b24238942bfadb67b2e100000000000800030007000000080001000c000500"], 0xc4}, 0x1, 0x0, 0x0, 0x40010}, 0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x80, r3, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1f}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x40}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x63}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80000000}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x41}, 0x80) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000340)={r2, 0x1f087305, 0x3b, "b468b44a521a1d56c035566fac20d0ee0836d1e7ea6ba179a01e7c2107da25313376cbdf4dc7ca0fd15a1ab342d382362e6e9941395ea5eb12f9a8"}, 0x43) 10:08:20 executing program 1: semget$private(0x0, 0x4007, 0x1800) [ 1191.184200] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:20 executing program 0: semctl$GETALL(0x0, 0x56000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xdb000000, 0xd, &(0x7f00000000c0)=""/214) [ 1191.264758] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000000007ff", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:20 executing program 0: semctl$GETALL(0x0, 0x5d, 0xd, &(0x7f00000000c0)=""/214) [ 1191.394903] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1191.408822] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1191.422624] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:20 executing program 0: semctl$GETALL(0x0, 0xbb, 0xd, &(0x7f00000000c0)=""/214) 10:08:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000000000300", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000200", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:20 executing program 1: semget$private(0x0, 0x4007, 0x7000000) [ 1191.565825] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:20 executing program 0: semctl$GETALL(0x0, 0x9200000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:20 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x32010000, 0xd, &(0x7f00000000c0)=""/214) [ 1191.669184] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000000ff00", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000000000100", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:20 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = dup(0xffffffffffffffff) preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000000040)=""/225, 0xe1}, {&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x7, 0x1, 0x3, 0x1, 0xfffffffffffffffd, 0x101, 0x7a}, 0x20) 10:08:20 executing program 0: semctl$GETALL(0x0, 0xe000000000000000, 0xd, &(0x7f00000000c0)=""/214) [ 1191.766336] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1191.820903] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1193.538202] blkid (21702) used greatest stack depth: 5320 bytes left 10:08:23 executing program 0: semctl$GETALL(0x0, 0x5601, 0xd, &(0x7f00000000c0)=""/214) 10:08:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e61740000000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:24 executing program 5: semget$private(0x0, 0x4007, 0x4) 10:08:24 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9e01, 0xd, &(0x7f00000000c0)=""/214) 10:08:24 executing program 1: semget$private(0x0, 0x4007, 0x15000000) [ 1195.155285] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1195.198371] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:24 executing program 0: semctl$GETALL(0x0, 0x1fa, 0xd, &(0x7f00000000c0)=""/214) [ 1195.279937] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000600", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:24 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x9a, 0xd, &(0x7f00000000c0)=""/214) 10:08:24 executing program 5: semget$private(0x0, 0x2, 0x13) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) 10:08:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000200", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1195.428936] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 10:08:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000400", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1195.527915] device bridge_slave_1 left promiscuous mode [ 1195.533525] bridge0: port 2(bridge_slave_1) entered disabled state [ 1195.646243] device bridge_slave_0 left promiscuous mode [ 1195.660841] bridge0: port 1(bridge_slave_0) entered disabled state [ 1195.748923] team0 (unregistering): Port device team_slave_1 removed [ 1195.776662] team0 (unregistering): Port device team_slave_0 removed [ 1195.838218] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1195.947660] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1196.032051] bond0 (unregistering): Released all slaves 10:08:25 executing program 1: semget$private(0x0, 0x4007, 0xde000000) 10:08:25 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x44, 0xd, &(0x7f00000000c0)=""/214) 10:08:25 executing program 5: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x7, 0xb0c00) [ 1196.488469] IPVS: ftp: loaded support on port[0] = 21 10:08:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e617400000000000000000000000000000000000000000000000000007fffff", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={"6e617400000000000000000000000000000000000000000000000500", 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1196.613954] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1196.771256] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask [ 1198.648584] rsyslogd invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 1198.660401] rsyslogd cpuset=/ mems_allowed=0 [ 1198.665130] CPU: 0 PID: 5175 Comm: rsyslogd Not tainted 4.19.0-rc7+ #281 [ 1198.671948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1198.681277] Call Trace: [ 1198.683901] dump_stack+0x1c4/0x2b4 [ 1198.687564] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1198.692790] ? mark_held_locks+0x130/0x130 [ 1198.697022] ? mark_held_locks+0x130/0x130 [ 1198.701238] dump_header+0x27b/0xf72 [ 1198.704961] ? pagefault_out_of_memory+0x197/0x197 [ 1198.709908] ? __lock_acquire+0x7ec/0x4ec0 [ 1198.714143] ? print_usage_bug+0xc0/0xc0 [ 1198.718226] ? graph_lock+0x170/0x170 [ 1198.722062] ? print_usage_bug+0xc0/0xc0 [ 1198.726135] ? print_usage_bug+0xc0/0xc0 [ 1198.730226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1198.735754] ? find_held_lock+0x36/0x1c0 [ 1198.739917] ? mark_held_locks+0xc7/0x130 [ 1198.744124] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1198.749224] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1198.754373] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1198.758974] ? trace_hardirqs_on+0xbd/0x310 [ 1198.763292] ? kasan_check_read+0x11/0x20 [ 1198.767485] ? ___ratelimit+0x36f/0x655 [ 1198.771482] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1198.776991] ? trace_hardirqs_on+0x310/0x310 [ 1198.781438] ? lock_downgrade+0x900/0x900 [ 1198.785591] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1198.790725] ? ___ratelimit+0xaa/0x655 [ 1198.794664] ? idr_get_free+0xec0/0xec0 [ 1198.798676] ? kasan_check_write+0x14/0x20 [ 1198.802901] ? do_raw_spin_lock+0xc1/0x200 [ 1198.807127] oom_kill_process.cold.27+0x10/0x903 [ 1198.811956] ? graph_lock+0x170/0x170 [ 1198.815770] ? _raw_spin_unlock+0x2c/0x50 [ 1198.819991] ? oom_badness+0xe6/0xaa0 [ 1198.823854] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1198.829640] ? kasan_check_read+0x11/0x20 [ 1198.833809] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1198.839167] ? oom_evaluate_task+0x540/0x540 [ 1198.843633] ? find_held_lock+0x36/0x1c0 [ 1198.847761] ? out_of_memory+0x974/0x1430 [ 1198.851920] ? lock_downgrade+0x900/0x900 [ 1198.856130] ? check_preemption_disabled+0x48/0x200 [ 1198.861205] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1198.867015] ? kasan_check_read+0x11/0x20 [ 1198.871175] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1198.876512] ? rcu_bh_qs+0xc0/0xc0 [ 1198.880114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1198.885641] ? oom_evaluate_task+0x302/0x540 [ 1198.890111] out_of_memory+0xa84/0x1430 [ 1198.894118] ? oom_killer_disable+0x3a0/0x3a0 [ 1198.898633] ? __alloc_pages_slowpath+0xe76/0x2d80 [ 1198.903577] ? __mutex_add_waiter+0x2a0/0x2a0 [ 1198.908113] __alloc_pages_slowpath+0x2318/0x2d80 [ 1198.913113] ? warn_alloc+0x120/0x120 [ 1198.916973] ? __radix_tree_lookup+0x4c0/0x4c0 [ 1198.921644] ? find_get_entry+0x2f2/0xc40 [ 1198.925826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1198.931367] ? add_to_page_cache_lru+0x10b0/0x10b0 [ 1198.936387] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1198.942025] ? should_fail+0x22d/0xd01 [ 1198.946018] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1198.951212] ? __lock_is_held+0xb5/0x140 [ 1198.955280] ? __lock_is_held+0xb5/0x140 [ 1198.959354] ? ___might_sleep+0x1ed/0x300 [ 1198.963516] ? lock_release+0x970/0x970 [ 1198.967548] ? arch_local_save_flags+0x40/0x40 [ 1198.972173] ? __might_sleep+0x95/0x190 [ 1198.976160] __alloc_pages_nodemask+0xa80/0xde0 [ 1198.980819] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 1198.985883] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1198.991706] ? kasan_check_read+0x11/0x20 [ 1198.995923] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1199.001280] ? graph_lock+0x170/0x170 [ 1199.005110] ? print_usage_bug+0xc0/0xc0 [ 1199.009228] ? graph_lock+0x170/0x170 [ 1199.013020] ? graph_lock+0x170/0x170 [ 1199.016843] ? __do_page_cache_readahead+0x7ce/0x980 [ 1199.022074] ? find_held_lock+0x36/0x1c0 [ 1199.026145] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1199.031670] alloc_pages_current+0x10c/0x210 [ 1199.036096] ? lock_downgrade+0x900/0x900 [ 1199.040268] __page_cache_alloc+0x38f/0x5b0 [ 1199.044619] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1199.050417] ? kasan_check_read+0x11/0x20 [ 1199.054543] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1199.059823] ? __filemap_set_wb_err+0x3b0/0x3b0 [ 1199.064589] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1199.070152] ? check_preemption_disabled+0x48/0x200 [ 1199.075152] filemap_fault+0x1594/0x25f0 [ 1199.079201] ? __lock_page_or_retry+0xa00/0xa00 [ 1199.083854] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1199.089635] ? kasan_check_read+0x11/0x20 [ 1199.093815] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1199.099113] ? rcu_bh_qs+0xc0/0xc0 [ 1199.102647] ? find_held_lock+0x36/0x1c0 [ 1199.106795] ? filemap_map_pages+0xdea/0x1980 [ 1199.111273] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1199.117054] ? find_get_pages_range_tag+0x1320/0x1320 [ 1199.122223] ? unwind_dump+0x190/0x190 [ 1199.126098] ? graph_lock+0x170/0x170 [ 1199.129877] ? is_bpf_text_address+0xd3/0x170 [ 1199.134354] ? __kernel_text_address+0xd/0x40 [ 1199.138848] ? lock_acquire+0x1ed/0x520 [ 1199.142801] ? ext4_filemap_fault+0x7a/0xad [ 1199.147103] ? lock_release+0x970/0x970 [ 1199.151055] ? arch_local_save_flags+0x40/0x40 [ 1199.155612] ? save_stack+0x43/0xd0 [ 1199.159222] ? __kasan_slab_free+0x102/0x150 [ 1199.163606] ? kasan_slab_free+0xe/0x10 [ 1199.167576] ? kfree+0xcf/0x230 [ 1199.170835] ? print_usage_bug+0xc0/0xc0 [ 1199.174877] ? __vfs_read+0x117/0x9b0 [ 1199.178665] ? down_read+0xb0/0x1d0 [ 1199.182282] ? ext4_filemap_fault+0x7a/0xad [ 1199.186606] ? __down_interruptible+0x700/0x700 [ 1199.191266] ext4_filemap_fault+0x82/0xad [ 1199.195400] __do_fault+0x100/0x6b0 [ 1199.199007] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1199.204437] ? print_bad_pte+0x6c0/0x6c0 [ 1199.208475] ? __kasan_slab_free+0x119/0x150 [ 1199.212961] ? pmd_val+0x88/0x100 [ 1199.216391] ? add_mm_counter_fast+0xd0/0xd0 [ 1199.220775] ? pmd_val+0x88/0x100 [ 1199.224216] ? add_mm_counter_fast+0xd0/0xd0 [ 1199.228604] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1199.234143] __handle_mm_fault+0x3709/0x53e0 [ 1199.238531] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 1199.243353] ? graph_lock+0x170/0x170 [ 1199.247133] ? print_usage_bug+0xc0/0xc0 [ 1199.251173] ? graph_lock+0x170/0x170 [ 1199.254951] ? graph_lock+0x170/0x170 [ 1199.258736] ? handle_mm_fault+0x42a/0xc70 [ 1199.262950] ? lock_downgrade+0x900/0x900 [ 1199.267077] ? check_preemption_disabled+0x48/0x200 [ 1199.272083] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1199.277864] ? kasan_check_read+0x11/0x20 [ 1199.281998] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1199.287256] ? rcu_bh_qs+0xc0/0xc0 [ 1199.290772] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1199.296199] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1199.301722] ? check_preemption_disabled+0x48/0x200 [ 1199.306728] handle_mm_fault+0x54f/0xc70 [ 1199.310775] ? __handle_mm_fault+0x53e0/0x53e0 [ 1199.315338] ? find_vma+0x34/0x190 [ 1199.318860] __do_page_fault+0x67d/0xed0 [ 1199.322904] ? mm_fault_error+0x380/0x380 [ 1199.327027] ? trace_hardirqs_off+0xb8/0x310 [ 1199.331416] ? trace_hardirqs_on+0x310/0x310 [ 1199.335803] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.341149] ? trace_hardirqs_on+0x310/0x310 [ 1199.345547] do_page_fault+0xf2/0x7e0 [ 1199.349324] ? vmalloc_sync_all+0x30/0x30 [ 1199.353551] ? error_entry+0x70/0xd0 [ 1199.357245] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1199.362241] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1199.367414] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1199.372340] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1199.377163] ? trace_hardirqs_on_caller+0x310/0x310 [ 1199.382237] ? trace_hardirqs_off+0x310/0x310 [ 1199.387043] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1199.392071] ? page_fault+0x8/0x30 [ 1199.395590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1199.400418] ? page_fault+0x8/0x30 [ 1199.403938] page_fault+0x1e/0x30 [ 1199.407372] RIP: 0033:0x7facd728b1fd [ 1199.411069] Code: Bad RIP value. [ 1199.414412] RSP: 002b:00007facd482ae30 EFLAGS: 00010293 [ 1199.419754] RAX: 0000000000000caa RBX: 000000000073d650 RCX: 00007facd728b1fd [ 1199.427011] RDX: 0000000000000fff RSI: 00007facd605f5a0 RDI: 0000000000000004 [ 1199.434264] RBP: 0000000000000000 R08: 0000000000728260 R09: 0000000000000000 [ 1199.441512] R10: 6b205d3236393438 R11: 0000000000000293 R12: 000000000065e420 [ 1199.448769] R13: 00007facd482b9c0 R14: 00007facd78d0040 R15: 0000000000000003 [ 1199.457958] Mem-Info: [ 1199.460394] active_anon:103894 inactive_anon:108 isolated_anon:0 [ 1199.460394] active_file:35 inactive_file:19 isolated_file:9 [ 1199.460394] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1199.460394] slab_reclaimable:12333 slab_unreclaimable:1274442 [ 1199.460394] mapped:45608 shmem:118 pagetables:1511 bounce:0 [ 1199.460394] free:24282 free_pcp:229 free_cma:0 [ 1199.493682] Node 0 active_anon:415576kB inactive_anon:432kB active_file:140kB inactive_file:76kB unevictable:0kB isolated(anon):0kB isolated(file):36kB mapped:182432kB dirty:0kB writeback:0kB shmem:472kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 83968kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1199.521428] device bridge_slave_1 left promiscuous mode [ 1199.521444] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1199.526897] bridge0: port 2(bridge_slave_1) entered disabled state [ 1199.553981] lowmem_reserve[]: 0 2819 6323 6323 [ 1199.564072] Node 0 DMA32 free:44020kB min:30060kB low:37572kB high:45084kB active_anon:2096kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1199.591645] lowmem_reserve[]: 0 0 3503 3503 [ 1199.596113] Node 0 Normal free:37752kB min:37352kB low:46688kB high:56024kB active_anon:413480kB inactive_anon:432kB active_file:92kB inactive_file:132kB unevictable:0kB writepending:0kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6272kB pagetables:6040kB bounce:0kB free_pcp:444kB local_pcp:0kB free_cma:0kB [ 1199.625172] lowmem_reserve[]: 0 0 0 0 [ 1199.629123] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1199.642936] Node 0 DMA32: 5*4kB (ME) 2*8kB (M) 5*16kB (ME) 4*32kB (ME) 6*64kB (UME) 3*128kB (ME) 4*256kB (ME) 4*512kB (ME) 3*1024kB (ME) 4*2048kB (UME) 7*4096kB (M) = 44020kB [ 1199.659052] Node 0 Normal: 1094*4kB (ME) 365*8kB (M) 76*16kB (UME) 36*32kB (ME) 17*64kB (ME) 4*128kB (UM) 3*256kB (UME) 11*512kB (UME) 19*1024kB (UM) 0*2048kB 0*4096kB = 37120kB [ 1199.675854] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1199.692694] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1199.710213] 197 total pagecache pages [ 1199.714035] 0 pages in swap cache [ 1199.732042] Swap cache stats: add 0, delete 0, find 0/0 [ 1199.738186] device bridge_slave_0 left promiscuous mode [ 1199.743761] bridge0: port 1(bridge_slave_0) entered disabled state [ 1199.760363] Free swap = 0kB [ 1199.763384] Total swap = 0kB [ 1199.766404] 1965979 pages RAM [ 1199.789771] 0 pages HighMem/MovableOnly [ 1199.793747] 342307 pages reserved [ 1199.797187] 0 pages cma reserved [ 1199.825025] Unreclaimable slab info: [ 1199.839585] Name Used Total [ 1199.845237] pid_2 138KB 176KB [ 1199.878060] TIPC 21KB 21KB [ 1199.883439] SCTPv6 30KB 30KB [ 1199.916839] DCCPv6 26KB 29KB [ 1199.940548] DCCP 20KB 20KB [ 1199.945961] bridge_fdb_cache 13KB 27KB [ 1199.971815] fib6_nodes 90KB 136KB [ 1199.977197] ip6_dst_cache 131KB 315KB [ 1200.009943] RAWv6 97KB 97KB [ 1200.015467] UDPv6 3KB 3KB [ 1200.047417] TCPv6 20KB 23KB [ 1200.052911] nf_conntrack 0KB 7KB [ 1200.093496] sd_ext_cdb 0KB 3KB [ 1200.124153] scsi_sense_cache 1056KB 1060KB [ 1200.140645] virtio_scsi_cmd 16KB 16KB [ 1200.146133] sgpool-128 8KB 8KB [ 1200.151715] sgpool-64 4KB 6KB [ 1200.157059] sgpool-32 2KB 7KB [ 1200.162440] sgpool-16 1KB 3KB [ 1200.167830] sgpool-8 0KB 3KB [ 1200.173192] mqueue_inode_cache 14KB 21KB [ 1200.178698] bio_post_read_ctx 14KB 15KB [ 1200.184116] bio-2 14KB 15KB [ 1200.189509] jfs_mp 7KB 7KB [ 1200.195076] nfs_commit_data 3KB 7KB [ 1200.200475] nfs_write_data 34KB 37KB [ 1200.205858] jbd2_inode 1KB 3KB [ 1200.211255] ext4_system_zone 0KB 3KB [ 1200.216869] bio-1 1KB 3KB [ 1200.222279] pid_namespace 3KB 7KB [ 1200.227694] rpc_buffers 17KB 19KB [ 1200.233050] rpc_tasks 2KB 3KB [ 1200.238430] UNIX 19KB 29KB [ 1200.243778] tcp_bind_bucket 3KB 8KB [ 1200.250000] ip_fib_trie 13KB 23KB [ 1200.255360] ip_fib_alias 60KB 90KB [ 1200.287373] ip_dst_cache 1KB 8KB [ 1200.292745] RAW 56KB 86KB [ 1200.325278] UDP 24KB 32KB [ 1200.347964] TCP 8KB 16KB [ 1200.353345] hugetlbfs_inode_cache 2KB 7KB [ 1200.393454] fscache_cookie_jar 1KB 3KB [ 1200.398972] eventpoll_pwq 32KB 39KB [ 1200.404451] eventpoll_epi 57KB 70KB [ 1200.413910] inotify_inode_mark 66KB 70KB [ 1200.442864] request_queue 160KB 160KB [ 1200.457580] blkdev_requests 1KB 3KB [ 1200.462948] blkdev_ioc 62KB 65KB [ 1200.497741] bio-0 3712KB 3712KB [ 1200.519364] biovec-max 2557KB 2557KB [ 1200.524739] biovec-64 3134KB 3134KB [ 1200.563209] biovec-16 978KB 978KB [ 1200.581057] bio_integrity_payload 1KB 8KB [ 1200.606895] khugepaged_mm_slot 12KB 23KB [ 1200.625194] user_namespace 10KB 18KB [ 1200.646268] dmaengine-unmap-256 2KB 6KB [ 1200.679325] dmaengine-unmap-128 1KB 3KB [ 1200.684866] dmaengine-unmap-16 0KB 4KB [ 1200.732841] dmaengine-unmap-2 0KB 3KB [ 1200.754456] skbuff_fclone_cache 193KB 236KB [ 1200.767047] skbuff_head_cache 1690KB 2595KB [ 1200.788091] configfs_dir_cache 0KB 4KB [ 1200.793573] file_lock_cache 0KB 3KB [ 1200.819071] file_lock_ctx 0KB 3KB [ 1200.824445] fsnotify_mark_connector 36KB 39KB [ 1200.836772] net_namespace 69KB 69KB [ 1200.842175] shmem_inode_cache 4634KB 4698KB [ 1200.867378] task_delay_info 138KB 245KB [ 1200.872748] taskstats 133KB 149KB [ 1200.895666] proc_dir_entry 678KB 813KB [ 1200.906691] pde_opener 0KB 3KB [ 1200.917420] seq_file 212KB 255KB [ 1200.922783] sigqueue 150KB 322KB [ 1200.943383] kernfs_node_cache 10205KB 10398KB [ 1200.952101] mnt_cache 108KB 152KB [ 1200.957523] filp 4000KB 4597KB [ 1200.962884] names_cache 90304KB 90342KB [ 1200.985167] iint_cache 76KB 79KB [ 1200.990566] key_jar 4KB 11KB [ 1200.995925] uts_namespace 5KB 7KB [ 1201.004859] nsproxy 11KB 23KB [ 1201.010260] vm_area_struct 8800KB 13736KB [ 1201.015615] mm_struct 1746KB 2710KB [ 1201.028286] fs_cache 173KB 304KB [ 1201.033657] files_cache 549KB 930KB [ 1201.052866] signal_cache 1017KB 1674KB [ 1201.067423] sighand_cache 411KB 423KB [ 1201.072796] task_struct 4052KB 4108KB [ 1201.089506] cred_jar 928KB 1680KB [ 1201.094875] anon_vma_chain 4352KB 5106KB [ 1201.112956] anon_vma 199KB 369KB [ 1201.118376] pid 57KB 120KB [ 1201.123740] Acpi-Operand 106KB 158KB [ 1201.130394] Acpi-Namespace 19KB 23KB [ 1201.135774] numa_policy 0KB 3KB [ 1201.141199] debug_objects_cache 1312KB 1366KB [ 1201.146740] trace_event_file 258KB 258KB [ 1201.159521] ftrace_event_field 372KB 374KB [ 1201.165068] pool_workqueue 84KB 84KB [ 1201.181892] task_group 5KB 7KB [ 1201.187279] page->ptl 2169KB 3020KB [ 1201.210245] kmalloc-4194304 4698112KB 4698112KB [ 1201.215629] kmalloc-2097152 2050KB 2050KB [ 1201.243284] kmalloc-524288 2056KB 2056KB [ 1201.262290] kmalloc-262144 1290KB 1290KB [ 1201.277223] kmalloc-131072 650KB 650KB [ 1201.294731] kmalloc-65536 3630KB 4026KB [ 1201.312892] kmalloc-32768 16005KB 16170KB [ 1201.326243] kmalloc-16384 1699KB 1749KB [ 1201.348437] kmalloc-8192 1980KB 1996KB [ 1201.353816] kmalloc-4096 16706KB 16706KB [ 1201.377720] kmalloc-2048 9099KB 10225KB [ 1201.383636] kmalloc-1024 4656KB 5985KB [ 1201.407412] kmalloc-512 4246KB 6026KB [ 1201.412810] kmalloc-256 2114KB 2880KB [ 1201.446454] kmalloc-128 958KB 1090KB [ 1201.464465] kmalloc-96 3384KB 3384KB [ 1201.482254] kmalloc-64 1360KB 1412KB [ 1201.496767] kmalloc-32 1573KB 1838KB [ 1201.514078] kmalloc-192 940KB 1204KB [ 1201.532084] kmem_cache 264KB 266KB [ 1201.546824] Out of memory: Kill process 21125 (syz-executor2) score 1004 or sacrifice child [ 1201.575032] Killed process 21125 (syz-executor2) total-vm:70472kB, anon-rss:2200kB, file-rss:32768kB, shmem-rss:0kB [ 1201.982531] team0 (unregistering): Port device team_slave_1 removed [ 1202.012248] team0 (unregistering): Port device team_slave_0 removed [ 1202.023496] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1202.081771] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1202.123627] syz-fuzzer invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 1202.146268] syz-fuzzer cpuset=/ mems_allowed=0 [ 1202.153473] CPU: 0 PID: 5291 Comm: syz-fuzzer Not tainted 4.19.0-rc7+ #281 [ 1202.153483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1202.169948] Call Trace: [ 1202.172559] dump_stack+0x1c4/0x2b4 [ 1202.176203] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1202.181400] ? mark_held_locks+0x130/0x130 [ 1202.185636] ? mark_held_locks+0x130/0x130 [ 1202.189871] dump_header+0x27b/0xf72 [ 1202.189894] ? pagefault_out_of_memory+0x197/0x197 [ 1202.189911] ? __lock_acquire+0x7ec/0x4ec0 [ 1202.189926] ? mem_cgroup_charge_statistics+0x780/0x780 [ 1202.208143] ? print_usage_bug+0xc0/0xc0 [ 1202.208158] ? print_usage_bug+0xc0/0xc0 [ 1202.208176] ? graph_lock+0x170/0x170 [ 1202.208192] ? print_usage_bug+0xc0/0xc0 [ 1202.216731] ? print_usage_bug+0xc0/0xc0 [ 1202.216751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1202.234147] ? find_held_lock+0x36/0x1c0 [ 1202.238213] ? mark_held_locks+0xc7/0x130 [ 1202.242363] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1202.247468] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1202.252560] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1202.257146] ? trace_hardirqs_on+0xbd/0x310 [ 1202.261465] ? kasan_check_read+0x11/0x20 [ 1202.261479] ? ___ratelimit+0x36f/0x655 [ 1202.261493] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1202.261507] ? trace_hardirqs_on+0x310/0x310 [ 1202.261520] ? lock_downgrade+0x900/0x900 [ 1202.261538] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1202.261552] ? ___ratelimit+0xaa/0x655 [ 1202.261566] ? idr_get_free+0xec0/0xec0 [ 1202.279510] ? kasan_check_write+0x14/0x20 [ 1202.288723] ? do_raw_spin_lock+0xc1/0x200 [ 1202.288745] oom_kill_process.cold.27+0x10/0x903 [ 1202.288759] ? graph_lock+0x170/0x170 [ 1202.288773] ? _raw_spin_unlock+0x2c/0x50 [ 1202.296619] ? oom_badness+0xe6/0xaa0 [ 1202.309792] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1202.309804] ? kasan_check_read+0x11/0x20 [ 1202.309817] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1202.309831] ? oom_evaluate_task+0x540/0x540 [ 1202.317892] ? find_held_lock+0x36/0x1c0 [ 1202.317911] ? out_of_memory+0x974/0x1430 [ 1202.317925] ? lock_downgrade+0x900/0x900 [ 1202.317941] ? check_preemption_disabled+0x48/0x200 [ 1202.317960] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1202.317971] ? kasan_check_read+0x11/0x20 [ 1202.317983] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1202.317998] ? rcu_bh_qs+0xc0/0xc0 [ 1202.331682] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1202.341377] ? oom_evaluate_task+0x302/0x540 [ 1202.341397] out_of_memory+0xa84/0x1430 [ 1202.341419] ? oom_killer_disable+0x3a0/0x3a0 [ 1202.341435] ? __alloc_pages_slowpath+0xe76/0x2d80 [ 1202.341454] ? __mutex_add_waiter+0x2a0/0x2a0 [ 1202.341485] __alloc_pages_slowpath+0x2318/0x2d80 [ 1202.358802] ? warn_alloc+0x120/0x120 [ 1202.358817] ? __radix_tree_lookup+0x4c0/0x4c0 [ 1202.358842] ? find_get_entry+0x2f2/0xc40 [ 1202.358862] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1202.368787] ? add_to_page_cache_lru+0x10b0/0x10b0 [ 1202.368801] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1202.368815] ? should_fail+0x22d/0xd01 [ 1202.368850] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1202.377632] ? __lock_is_held+0xb5/0x140 [ 1202.377667] ? __lock_is_held+0xb5/0x140 [ 1202.377692] ? ___might_sleep+0x1ed/0x300 [ 1202.377703] ? lock_release+0x970/0x970 [ 1202.377716] ? arch_local_save_flags+0x40/0x40 [ 1202.377735] ? __might_sleep+0x95/0x190 [ 1202.377751] __alloc_pages_nodemask+0xa80/0xde0 [ 1202.377787] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 1202.391645] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1202.401026] ? kasan_check_read+0x11/0x20 [ 1202.401041] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1202.401053] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1202.401068] ? graph_lock+0x170/0x170 [ 1202.401082] ? trace_hardirqs_on+0xbd/0x310 [ 1202.401095] ? print_usage_bug+0xc0/0xc0 [ 1202.401108] ? graph_lock+0x170/0x170 [ 1202.401131] ? graph_lock+0x170/0x170 [ 1202.414204] ? __do_page_cache_readahead+0x7ce/0x980 [ 1202.414222] ? find_held_lock+0x36/0x1c0 [ 1202.422904] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1202.433340] alloc_pages_current+0x10c/0x210 [ 1202.442832] ? lock_downgrade+0x900/0x900 [ 1202.451953] __page_cache_alloc+0x38f/0x5b0 [ 1202.460108] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1202.460126] ? kasan_check_read+0x11/0x20 [ 1202.460140] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1202.460155] ? __filemap_set_wb_err+0x3b0/0x3b0 [ 1202.460170] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1202.460185] ? check_preemption_disabled+0x48/0x200 [ 1202.460204] filemap_fault+0x1594/0x25f0 [ 1202.472735] ? __lock_page_or_retry+0xa00/0xa00 [ 1202.482382] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1202.482395] ? kasan_check_read+0x11/0x20 [ 1202.492317] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1202.506429] ? rcu_bh_qs+0xc0/0xc0 [ 1202.531464] ? filemap_map_pages+0xdea/0x1980 [ 1202.541375] ? find_get_pages_range_tag+0x1320/0x1320 [ 1202.541391] ? graph_lock+0x170/0x170 [ 1202.541423] ? lock_acquire+0x1ed/0x520 [ 1202.541438] ? ext4_filemap_fault+0x7a/0xad [ 1202.580219] ? lock_release+0x970/0x970 [ 1202.588912] ? arch_local_save_flags+0x40/0x40 [ 1202.588930] ? futex_wait_setup+0x3e0/0x3e0 [ 1202.588951] ? down_read+0xb0/0x1d0 [ 1202.588966] ? ext4_filemap_fault+0x7a/0xad [ 1202.637924] ? __down_interruptible+0x700/0x700 [ 1202.637941] ? graph_lock+0x170/0x170 [ 1202.637964] ext4_filemap_fault+0x82/0xad [ 1202.637979] __do_fault+0x100/0x6b0 [ 1202.637992] ? find_held_lock+0x36/0x1c0 [ 1202.654912] ? print_bad_pte+0x6c0/0x6c0 [ 1202.674569] ? pmd_val+0x88/0x100 [ 1202.674584] ? add_mm_counter_fast+0xd0/0xd0 [ 1202.682401] ? pmd_val+0x88/0x100 [ 1202.685850] ? add_mm_counter_fast+0xd0/0xd0 [ 1202.690259] ? arch_local_save_flags+0x40/0x40 [ 1202.694846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1202.700417] __handle_mm_fault+0x3709/0x53e0 [ 1202.700438] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 1202.700452] ? graph_lock+0x170/0x170 [ 1202.700466] ? print_usage_bug+0xc0/0xc0 [ 1202.700483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1202.723125] ? graph_lock+0x170/0x170 [ 1202.726912] ? graph_lock+0x170/0x170 [ 1202.730714] ? handle_mm_fault+0x42a/0xc70 [ 1202.730726] ? lock_downgrade+0x900/0x900 [ 1202.730743] ? check_preemption_disabled+0x48/0x200 [ 1202.744109] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1202.749903] ? kasan_check_read+0x11/0x20 [ 1202.754064] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1202.759344] ? rcu_bh_qs+0xc0/0xc0 [ 1202.759358] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1202.759372] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1202.759388] ? check_preemption_disabled+0x48/0x200 [ 1202.759405] handle_mm_fault+0x54f/0xc70 [ 1202.759421] ? __handle_mm_fault+0x53e0/0x53e0 [ 1202.768382] ? find_vma+0x34/0x190 [ 1202.768400] __do_page_fault+0x67d/0xed0 [ 1202.768420] ? mm_fault_error+0x380/0x380 [ 1202.768431] ? trace_hardirqs_off+0xb8/0x310 [ 1202.768444] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1202.768458] ? trace_hardirqs_on+0x310/0x310 [ 1202.791199] do_page_fault+0xf2/0x7e0 [ 1202.799391] ? vmalloc_sync_all+0x30/0x30 [ 1202.799404] ? error_entry+0x70/0xd0 [ 1202.799419] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1202.799430] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1202.799444] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1202.799459] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1202.825207] ? trace_hardirqs_on_caller+0x310/0x310 [ 1202.849957] ? trace_hardirqs_off+0x310/0x310 [ 1202.849975] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1202.849987] ? page_fault+0x8/0x30 [ 1202.850005] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1202.868084] ? page_fault+0x8/0x30 [ 1202.871621] page_fault+0x1e/0x30 [ 1202.875065] RIP: 0033:0x45d911 [ 1202.878259] Code: Bad RIP value. [ 1202.878266] RSP: 002b:000000c420035f18 EFLAGS: 00010246 [ 1202.878277] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 000000000045d911 [ 1202.878285] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1202.878292] RBP: 000000c420035f28 R08: 000000c420035f18 R09: 0000000000000000 [ 1202.878300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000430120 [ 1202.878307] R13: 00000000000000f1 R14: 0000000000000011 R15: 0000000000000000 [ 1203.025398] Mem-Info: [ 1203.027904] active_anon:103357 inactive_anon:108 isolated_anon:0 [ 1203.027904] active_file:14 inactive_file:14 isolated_file:0 [ 1203.027904] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1203.027904] slab_reclaimable:12314 slab_unreclaimable:1274169 [ 1203.027904] mapped:46669 shmem:118 pagetables:1490 bounce:0 [ 1203.027904] free:24317 free_pcp:263 free_cma:0 [ 1203.027948] Node 0 active_anon:413428kB inactive_anon:432kB active_file:56kB inactive_file:56kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:186676kB dirty:0kB writeback:0kB shmem:472kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 81920kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1203.089342] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1203.116020] lowmem_reserve[]: 0 2819 6323 6323 [ 1203.123342] Node 0 DMA32 free:44020kB min:30060kB low:37572kB high:45084kB active_anon:2096kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1203.174221] bond0 (unregistering): Released all slaves [ 1203.176438] lowmem_reserve[]: 0 0 3503 3503 [ 1203.184235] Node 0 [ 1203.186519] Normal free:37120kB min:37352kB low:46688kB high:56024kB active_anon:411332kB inactive_anon:432kB active_file:536kB inactive_file:196kB unevictable:0kB writepending:0kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6240kB pagetables:5956kB bounce:0kB free_pcp:1392kB local_pcp:640kB free_cma:0kB [ 1203.215319] lowmem_reserve[]: 0 0 0 0 [ 1203.220078] Node 0 [ 1203.220095] DMA: [ 1203.222327] 1*4kB (U) 0*8kB 0*16kB 1*32kB [ 1203.232426] (U) [ 1203.232443] 2*64kB (U) 1*128kB (U) 1*256kB (U) [ 1203.247420] 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1203.253966] Node 0 DMA32: 5*4kB (ME) 2*8kB (M) 5*16kB (ME) 4*32kB (ME) 6*64kB (UME) 3*128kB (ME) 4*256kB (ME) 4*512kB (ME) 3*1024kB (ME) 4*2048kB (UME) 7*4096kB (M) = 44020kB [ 1203.292698] Node 0 Normal: 710*4kB (UME) 553*8kB (UME) 90*16kB (UME) 36*32kB (UM) 20*64kB (UME) 7*128kB (UM) 2*256kB (ME) 7*512kB (UME) 19*1024kB (UM) 1*2048kB (M) 0*4096kB = 37632kB [ 1203.310410] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1203.320757] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1203.331289] 298 total pagecache pages [ 1203.340667] 0 pages in swap cache [ 1203.344138] Swap cache stats: add 0, delete 0, find 0/0 [ 1203.350574] Free swap = 0kB [ 1203.353581] Total swap = 0kB [ 1203.353589] 1965979 pages RAM [ 1203.359756] 0 pages HighMem/MovableOnly [ 1203.359762] 342307 pages reserved [ 1203.359769] 0 pages cma reserved [ 1203.370599] Unreclaimable slab info: [ 1203.374308] Name Used Total [ 1203.380126] pid_2 132KB 176KB [ 1203.386008] TIPC 14KB 21KB [ 1203.391452] SCTPv6 20KB 30KB [ 1203.396936] DCCPv6 21KB 29KB [ 1203.402364] DCCP 18KB 20KB [ 1203.407839] bridge_fdb_cache 13KB 27KB [ 1203.413203] fib6_nodes 90KB 136KB [ 1203.420529] ip6_dst_cache 124KB 315KB [ 1203.426664] RAWv6 89KB 97KB [ 1203.432098] UDPv6 3KB 3KB [ 1203.437500] TCPv6 20KB 23KB [ 1203.442866] nf_conntrack 0KB 7KB [ 1203.448347] sd_ext_cdb 0KB 3KB [ 1203.453802] scsi_sense_cache 1056KB 1060KB [ 1203.464750] virtio_scsi_cmd 16KB 16KB [ 1203.470906] sgpool-128 8KB 8KB [ 1203.476937] sgpool-64 4KB 6KB [ 1203.484611] sgpool-32 2KB 7KB [ 1203.490280] sgpool-16 1KB 3KB [ 1203.496376] sgpool-8 0KB 3KB [ 1203.505126] mqueue_inode_cache 12KB 21KB [ 1203.510731] bio_post_read_ctx 14KB 15KB [ 1203.516137] bio-2 14KB 15KB [ 1203.521528] jfs_mp 7KB 7KB [ 1203.526986] nfs_commit_data 3KB 7KB [ 1203.532404] nfs_write_data 34KB 37KB [ 1203.537956] jbd2_inode 1KB 3KB [ 1203.543319] ext4_system_zone 0KB 3KB [ 1203.548744] bio-1 1KB 3KB [ 1203.554103] pid_namespace 3KB 7KB [ 1203.560085] rpc_buffers 17KB 19KB [ 1203.565843] rpc_tasks 2KB 3KB [ 1203.571971] UNIX 19KB 29KB [ 1203.585971] tcp_bind_bucket 2KB 8KB [ 1203.608798] ip_fib_trie 13KB 23KB [ 1203.614605] ip_fib_alias 60KB 90KB [ 1203.630238] ip_dst_cache 1KB 8KB [ 1203.637071] RAW 53KB 86KB [ 1203.643283] UDP 21KB 32KB [ 1203.649380] TCP 8KB 16KB [ 1203.660434] hugetlbfs_inode_cache 2KB 7KB [ 1203.668158] fscache_cookie_jar 1KB 3KB [ 1203.673617] eventpoll_pwq 28KB 39KB [ 1203.679084] eventpoll_epi 54KB 70KB [ 1203.684450] inotify_inode_mark 57KB 70KB [ 1203.720621] request_queue 160KB 160KB [ 1203.726040] blkdev_requests 1KB 3KB [ 1203.734729] blkdev_ioc 61KB 65KB [ 1203.741083] bio-0 3847KB 3847KB [ 1203.746688] biovec-max 2532KB 2532KB [ 1203.752079] biovec-64 3354KB 3354KB [ 1203.757506] biovec-16 1005KB 1005KB [ 1203.763486] bio_integrity_payload 1KB 8KB [ 1203.769902] khugepaged_mm_slot 11KB 23KB [ 1203.776053] user_namespace 8KB 18KB [ 1203.781976] dmaengine-unmap-256 2KB 6KB [ 1203.791040] dmaengine-unmap-128 1KB 3KB [ 1203.803631] dmaengine-unmap-16 0KB 4KB [ 1203.848329] dmaengine-unmap-2 0KB 3KB [ 1203.853788] skbuff_fclone_cache 178KB 236KB [ 1203.920192] skbuff_head_cache 1749KB 2595KB [ 1203.925574] configfs_dir_cache 0KB 4KB [ 1203.969630] file_lock_cache 0KB 3KB [ 1203.975019] file_lock_ctx 0KB 3KB [ 1204.016389] fsnotify_mark_connector 31KB 39KB [ 1204.039644] net_namespace 69KB 69KB [ 1204.045038] shmem_inode_cache 4595KB 4694KB [ 1204.081632] task_delay_info 128KB 245KB [ 1204.087004] taskstats 125KB 149KB [ 1204.132771] proc_dir_entry 675KB 813KB [ 1204.156537] pde_opener 1KB 3KB [ 1204.198212] seq_file 203KB 255KB [ 1204.203674] sigqueue 138KB 322KB [ 1204.244488] kernfs_node_cache 9766KB 10052KB [ 1204.271270] mnt_cache 106KB 152KB [ 1204.276655] filp 3965KB 4597KB [ 1204.323550] names_cache 89254KB 89254KB [ 1204.349842] iint_cache 75KB 79KB [ 1204.355239] key_jar 4KB 11KB [ 1204.405032] uts_namespace 4KB 7KB [ 1204.428972] nsproxy 10KB 23KB [ 1204.434385] vm_area_struct 8765KB 13720KB [ 1204.470660] mm_struct 1698KB 2691KB [ 1204.476033] fs_cache 159KB 304KB [ 1204.500326] files_cache 522KB 926KB [ 1204.505716] signal_cache 974KB 1653KB [ 1204.533857] sighand_cache 388KB 423KB [ 1204.539351] task_struct 4028KB 4071KB [ 1204.544716] cred_jar 892KB 1680KB [ 1204.570307] anon_vma_chain 4339KB 5106KB [ 1204.575681] anon_vma 187KB 369KB [ 1204.619519] pid 51KB 120KB [ 1204.624897] Acpi-Operand 106KB 158KB [ 1204.632141] Acpi-Namespace 19KB 23KB [ 1204.637569] numa_policy 0KB 3KB [ 1204.642930] debug_objects_cache 1311KB 1366KB [ 1204.650661] trace_event_file 258KB 258KB [ 1204.656041] ftrace_event_field 372KB 374KB [ 1204.661615] pool_workqueue 79KB 84KB [ 1204.666968] task_group 5KB 7KB [ 1204.672368] page->ptl 2153KB 3020KB [ 1204.677771] kmalloc-4194304 4698112KB 4698112KB [ 1204.683124] kmalloc-2097152 2050KB 2050KB [ 1204.688791] kmalloc-524288 2056KB 2056KB [ 1204.697225] kmalloc-262144 1290KB 1290KB [ 1204.702614] kmalloc-131072 650KB 650KB [ 1204.707996] kmalloc-65536 3366KB 3828KB [ 1204.713347] kmalloc-32768 15939KB 16104KB [ 1204.718732] kmalloc-16384 1666KB 1716KB [ 1204.724083] kmalloc-8192 1963KB 1980KB [ 1204.729464] kmalloc-4096 16706KB 16728KB [ 1204.734817] kmalloc-2048 9150KB 10225KB [ 1204.740289] kmalloc-1024 4750KB 5985KB [ 1204.745659] kmalloc-512 4314KB 6026KB [ 1204.751468] kmalloc-256 2114KB 2880KB [ 1204.756830] kmalloc-128 940KB 1090KB [ 1204.762220] kmalloc-96 3372KB 3384KB [ 1204.767722] kmalloc-64 1360KB 1412KB [ 1204.773081] kmalloc-32 1564KB 1838KB [ 1204.779371] kmalloc-192 940KB 1204KB [ 1204.784731] kmem_cache 264KB 266KB [ 1204.790187] Out of memory: Kill process 21141 (syz-executor2) score 1004 or sacrifice child [ 1204.799535] Killed process 21141 (syz-executor2) total-vm:70472kB, anon-rss:2200kB, file-rss:32768kB, shmem-rss:0kB [ 1205.435320] syz-fuzzer invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 1205.453473] syz-fuzzer cpuset=/ mems_allowed=0 [ 1205.464681] CPU: 0 PID: 5290 Comm: syz-fuzzer Not tainted 4.19.0-rc7+ #281 [ 1205.471710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1205.481066] Call Trace: [ 1205.483654] dump_stack+0x1c4/0x2b4 [ 1205.487279] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1205.492472] ? mark_held_locks+0x130/0x130 [ 1205.496697] ? mark_held_locks+0x130/0x130 [ 1205.500931] dump_header+0x27b/0xf72 [ 1205.504761] ? pagefault_out_of_memory+0x197/0x197 [ 1205.509679] ? mark_held_locks+0x130/0x130 [ 1205.513894] ? __lock_acquire+0x7ec/0x4ec0 [ 1205.518121] ? mem_cgroup_charge_statistics+0x780/0x780 [ 1205.523467] ? print_usage_bug+0xc0/0xc0 [ 1205.527508] ? print_usage_bug+0xc0/0xc0 [ 1205.531552] ? graph_lock+0x170/0x170 [ 1205.535334] ? print_usage_bug+0xc0/0xc0 [ 1205.539378] ? print_usage_bug+0xc0/0xc0 [ 1205.543426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1205.548961] ? find_held_lock+0x36/0x1c0 [ 1205.553032] ? mark_held_locks+0xc7/0x130 [ 1205.557180] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1205.562268] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1205.567362] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1205.571936] ? trace_hardirqs_on+0xbd/0x310 [ 1205.576246] ? kasan_check_read+0x11/0x20 [ 1205.580383] ? ___ratelimit+0x36f/0x655 [ 1205.584365] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1205.589807] ? trace_hardirqs_on+0x310/0x310 [ 1205.594201] ? lock_downgrade+0x900/0x900 [ 1205.598348] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1205.603455] ? ___ratelimit+0xaa/0x655 [ 1205.607331] ? idr_get_free+0xec0/0xec0 [ 1205.611296] ? kasan_check_write+0x14/0x20 [ 1205.615520] ? do_raw_spin_lock+0xc1/0x200 [ 1205.619749] oom_kill_process.cold.27+0x10/0x903 [ 1205.624491] ? graph_lock+0x170/0x170 [ 1205.628282] ? _raw_spin_unlock+0x2c/0x50 [ 1205.632418] ? oom_badness+0xe6/0xaa0 [ 1205.636209] ? oom_evaluate_task+0x540/0x540 [ 1205.640608] ? find_held_lock+0x36/0x1c0 [ 1205.644663] ? out_of_memory+0x974/0x1430 [ 1205.648799] ? lock_downgrade+0x900/0x900 [ 1205.652940] ? check_preemption_disabled+0x48/0x200 [ 1205.657950] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1205.663750] ? kasan_check_read+0x11/0x20 [ 1205.667888] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1205.673155] ? rcu_bh_qs+0xc0/0xc0 [ 1205.676817] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1205.681820] ? oom_evaluate_task+0x302/0x540 [ 1205.686217] out_of_memory+0xa84/0x1430 [ 1205.690188] ? oom_killer_disable+0x3a0/0x3a0 [ 1205.694673] ? __alloc_pages_slowpath+0xe76/0x2d80 [ 1205.699605] ? __mutex_add_waiter+0x2a0/0x2a0 [ 1205.704105] __alloc_pages_slowpath+0x2318/0x2d80 [ 1205.708957] ? warn_alloc+0x120/0x120 [ 1205.712749] ? __radix_tree_lookup+0x4c0/0x4c0 [ 1205.717333] ? find_get_entry+0x2f2/0xc40 [ 1205.721480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1205.727009] ? add_to_page_cache_lru+0x10b0/0x10b0 [ 1205.731930] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1205.737454] ? should_fail+0x22d/0xd01 [ 1205.741450] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1205.746539] ? __lock_is_held+0xb5/0x140 [ 1205.750603] ? __lock_is_held+0xb5/0x140 [ 1205.754662] ? ___might_sleep+0x1ed/0x300 [ 1205.758796] ? lock_release+0x970/0x970 [ 1205.762771] ? arch_local_save_flags+0x40/0x40 [ 1205.767354] ? __might_sleep+0x95/0x190 [ 1205.771320] __alloc_pages_nodemask+0xa80/0xde0 [ 1205.776002] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 1205.781010] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1205.786809] ? kasan_check_read+0x11/0x20 [ 1205.790942] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1205.796213] ? graph_lock+0x170/0x170 [ 1205.799998] ? print_usage_bug+0xc0/0xc0 [ 1205.804043] ? graph_lock+0x170/0x170 [ 1205.807826] ? graph_lock+0x170/0x170 [ 1205.811711] ? __do_page_cache_readahead+0x7ce/0x980 [ 1205.816889] ? find_held_lock+0x36/0x1c0 [ 1205.820949] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1205.826472] alloc_pages_current+0x10c/0x210 [ 1205.830858] ? lock_downgrade+0x900/0x900 [ 1205.834991] __page_cache_alloc+0x38f/0x5b0 [ 1205.839298] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1205.845106] ? kasan_check_read+0x11/0x20 [ 1205.849277] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1205.854537] ? __filemap_set_wb_err+0x3b0/0x3b0 [ 1205.859191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1205.864712] ? check_preemption_disabled+0x48/0x200 [ 1205.869734] filemap_fault+0x1594/0x25f0 [ 1205.873800] ? __lock_page_or_retry+0xa00/0xa00 [ 1205.878467] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1205.884264] ? kasan_check_read+0x11/0x20 [ 1205.888398] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1205.893685] ? rcu_bh_qs+0xc0/0xc0 [ 1205.897218] ? filemap_map_pages+0xdea/0x1980 [ 1205.901706] ? find_get_pages_range_tag+0x1320/0x1320 [ 1205.906891] ? graph_lock+0x170/0x170 [ 1205.910680] ? mark_held_locks+0x130/0x130 [ 1205.914920] ? lock_acquire+0x1ed/0x520 [ 1205.918888] ? ext4_filemap_fault+0x7a/0xad [ 1205.923192] ? lock_release+0x970/0x970 [ 1205.927154] ? arch_local_save_flags+0x40/0x40 [ 1205.931748] ? down_read+0xb0/0x1d0 [ 1205.935369] ? ext4_filemap_fault+0x7a/0xad [ 1205.939683] ? __down_interruptible+0x700/0x700 [ 1205.944349] ext4_filemap_fault+0x82/0xad [ 1205.948481] __do_fault+0x100/0x6b0 [ 1205.952105] ? lock_downgrade+0x900/0x900 [ 1205.956246] ? print_bad_pte+0x6c0/0x6c0 [ 1205.960398] ? kasan_check_read+0x11/0x20 [ 1205.964528] ? pmd_val+0x88/0x100 [ 1205.967967] ? add_mm_counter_fast+0xd0/0xd0 [ 1205.972355] ? pmd_val+0x88/0x100 [ 1205.975790] ? add_mm_counter_fast+0xd0/0xd0 [ 1205.980189] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1205.985709] __handle_mm_fault+0x3709/0x53e0 [ 1205.990114] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 1205.994936] ? graph_lock+0x170/0x170 [ 1205.998718] ? print_usage_bug+0xc0/0xc0 [ 1206.002774] ? graph_lock+0x170/0x170 [ 1206.006554] ? graph_lock+0x170/0x170 [ 1206.010382] ? handle_mm_fault+0x42a/0xc70 [ 1206.014620] ? lock_downgrade+0x900/0x900 [ 1206.018845] ? check_preemption_disabled+0x48/0x200 [ 1206.023847] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1206.029632] ? kasan_check_read+0x11/0x20 [ 1206.033764] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1206.039032] ? rcu_bh_qs+0xc0/0xc0 [ 1206.042565] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1206.048009] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1206.053540] ? check_preemption_disabled+0x48/0x200 [ 1206.058541] handle_mm_fault+0x54f/0xc70 [ 1206.062587] ? __handle_mm_fault+0x53e0/0x53e0 [ 1206.067154] ? find_vma+0x34/0x190 [ 1206.070679] __do_page_fault+0x67d/0xed0 [ 1206.074728] ? mm_fault_error+0x380/0x380 [ 1206.078858] ? trace_hardirqs_off+0xb8/0x310 [ 1206.083265] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1206.088616] ? trace_hardirqs_on+0x310/0x310 [ 1206.093121] do_page_fault+0xf2/0x7e0 [ 1206.096906] ? vmalloc_sync_all+0x30/0x30 [ 1206.101069] ? error_entry+0x70/0xd0 [ 1206.104764] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1206.109771] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1206.114685] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1206.119699] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1206.124522] ? trace_hardirqs_on_caller+0x310/0x310 [ 1206.129536] ? trace_hardirqs_off+0x310/0x310 [ 1206.134035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1206.139561] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1206.144573] ? page_fault+0x8/0x30 [ 1206.148099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1206.152926] ? page_fault+0x8/0x30 [ 1206.156460] page_fault+0x1e/0x30 [ 1206.159894] RIP: 0033:0x4081a7 [ 1206.163092] Code: Bad RIP value. [ 1206.166614] RSP: 002b:000000c4363efa20 EFLAGS: 00010246 [ 1206.171961] RAX: 000000000080a920 RBX: 0000000000000000 RCX: 000000c420000180 [ 1206.179216] RDX: 000000000080a920 RSI: 000000c4363efa58 RDI: 000000c4363efa58 [ 1206.186486] RBP: 000000c4363efa70 R08: 000000c420019370 R09: 000000c420019598 [ 1206.193740] R10: 0000000000000000 R11: 0000000000000001 R12: 000000c4363efb78 [ 1206.200996] R13: 000000c4363efb78 R14: 0000000000000000 R15: 0000000000000000 [ 1206.217123] Mem-Info: [ 1206.219707] active_anon:102846 inactive_anon:109 isolated_anon:0 [ 1206.219707] active_file:18 inactive_file:4 isolated_file:0 [ 1206.219707] unevictable:0 dirty:1 writeback:0 unstable:0 [ 1206.219707] slab_reclaimable:12331 slab_unreclaimable:1273712 [ 1206.219707] mapped:47637 shmem:118 pagetables:1433 bounce:0 [ 1206.219707] free:24226 free_pcp:9 free_cma:0 [ 1206.255396] Node 0 active_anon:411388kB inactive_anon:436kB active_file:56kB inactive_file:52kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:190472kB dirty:0kB writeback:0kB shmem:472kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 79872kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1206.289410] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1206.353580] lowmem_reserve[]: 0 2819 6323 6323 [ 1206.367824] Node 0 DMA32 free:44020kB min:30060kB low:37572kB high:45084kB active_anon:2096kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1206.494603] lowmem_reserve[]: 0 0 3503 3503 [ 1206.512908] Node 0 Normal free:37532kB min:37352kB low:46688kB high:56024kB active_anon:409292kB inactive_anon:436kB active_file:56kB inactive_file:144kB unevictable:0kB writepending:0kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6048kB pagetables:5728kB bounce:0kB free_pcp:496kB local_pcp:252kB free_cma:0kB [ 1206.542373] lowmem_reserve[]: 0 0 0 0 [ 1206.558877] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1206.573608] Node 0 DMA32: 5*4kB (ME) 2*8kB (M) 5*16kB (ME) 4*32kB (ME) 6*64kB (UME) 3*128kB (ME) 4*256kB (ME) 4*512kB (ME) 3*1024kB (ME) 4*2048kB (UME) 7*4096kB (M) = 44020kB [ 1206.589574] Node 0 Normal: 1208*4kB (UME) 432*8kB (UME) 83*16kB (UME) 34*32kB (UM) 19*64kB (UME) 6*128kB (UM) 3*256kB (UME) 6*512kB (ME) 17*1024kB (UM) 2*2048kB (M) 0*4096kB = 38032kB [ 1206.606283] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1206.615156] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1206.623863] 155 total pagecache pages [ 1206.637133] 0 pages in swap cache [ 1206.641765] Swap cache stats: add 0, delete 0, find 0/0 [ 1206.648395] Free swap = 0kB [ 1206.652677] Total swap = 0kB [ 1206.662957] 1965979 pages RAM [ 1206.666082] 0 pages HighMem/MovableOnly [ 1206.670065] 342307 pages reserved [ 1206.673581] 0 pages cma reserved [ 1206.676919] Unreclaimable slab info: [ 1206.680958] Name Used Total [ 1206.686646] pid_2 128KB 176KB [ 1206.692182] TIPC 12KB 21KB [ 1206.697662] SCTPv6 18KB 30KB [ 1206.703148] DCCPv6 17KB 29KB [ 1206.708668] DCCP 13KB 20KB [ 1206.714053] bridge_fdb_cache 13KB 27KB [ 1206.719551] fib6_nodes 90KB 136KB [ 1206.725034] ip6_dst_cache 123KB 315KB [ 1206.730618] RAWv6 87KB 97KB [ 1206.736169] UDPv6 3KB 3KB [ 1206.741805] TCPv6 20KB 23KB [ 1206.747543] nf_conntrack 0KB 7KB [ 1206.753025] sd_ext_cdb 0KB 3KB [ 1206.759381] scsi_sense_cache 1056KB 1060KB [ 1206.764870] virtio_scsi_cmd 16KB 16KB [ 1206.770486] sgpool-128 8KB 8KB [ 1206.776040] sgpool-64 4KB 6KB [ 1206.789692] sgpool-32 2KB 7KB [ 1206.795080] sgpool-16 1KB 3KB [ 1206.803378] sgpool-8 0KB 3KB [ 1206.809886] mqueue_inode_cache 12KB 21KB [ 1206.816156] bio_post_read_ctx 14KB 15KB [ 1206.821718] bio-2 14KB 15KB [ 1206.827150] jfs_mp 7KB 7KB [ 1206.832643] nfs_commit_data 3KB 7KB [ 1206.838111] nfs_write_data 34KB 37KB [ 1206.843589] jbd2_inode 1KB 3KB [ 1206.849059] ext4_system_zone 0KB 3KB [ 1206.854486] bio-1 1KB 3KB [ 1206.859958] pid_namespace 2KB 7KB [ 1206.865408] rpc_buffers 17KB 19KB [ 1206.870950] rpc_tasks 2KB 3KB [ 1206.876402] UNIX 19KB 29KB [ 1206.884125] tcp_bind_bucket 1KB 8KB [ 1206.889893] ip_fib_trie 13KB 23KB [ 1206.895420] ip_fib_alias 60KB 90KB [ 1206.901065] ip_dst_cache 1KB 8KB [ 1206.906575] RAW 51KB 86KB [ 1206.912671] UDP 19KB 32KB [ 1206.918104] TCP 8KB 16KB [ 1206.923538] hugetlbfs_inode_cache 2KB 7KB [ 1206.929297] fscache_cookie_jar 1KB 3KB [ 1206.934875] eventpoll_pwq 28KB 39KB [ 1206.940411] eventpoll_epi 52KB 70KB [ 1206.945831] inotify_inode_mark 52KB 70KB [ 1206.951338] request_queue 160KB 160KB [ 1206.956728] blkdev_requests 1KB 3KB [ 1206.962154] blkdev_ioc 61KB 65KB [ 1206.967659] bio-0 3930KB 3930KB [ 1206.973123] biovec-max 2574KB 2582KB [ 1206.978599] biovec-64 3512KB 3512KB [ 1206.984056] biovec-16 1023KB 1023KB [ 1206.989580] bio_integrity_payload 1KB 8KB [ 1206.995364] khugepaged_mm_slot 10KB 23KB [ 1207.000928] user_namespace 8KB 18KB [ 1207.006363] dmaengine-unmap-256 2KB 6KB [ 1207.012009] dmaengine-unmap-128 1KB 3KB [ 1207.017706] dmaengine-unmap-16 0KB 4KB [ 1207.023241] dmaengine-unmap-2 0KB 3KB [ 1207.038562] skbuff_fclone_cache 173KB 236KB [ 1207.044160] skbuff_head_cache 1749KB 2595KB [ 1207.049563] configfs_dir_cache 0KB 4KB [ 1207.055028] file_lock_cache 0KB 3KB [ 1207.060443] file_lock_ctx 0KB 3KB [ 1207.065800] fsnotify_mark_connector 30KB 39KB [ 1207.071770] net_namespace 69KB 69KB [ 1207.077132] shmem_inode_cache 4563KB 4690KB [ 1207.082542] task_delay_info 119KB 245KB [ 1207.087987] taskstats 117KB 149KB [ 1207.093371] proc_dir_entry 674KB 813KB [ 1207.098804] pde_opener 1KB 3KB [ 1207.104163] seq_file 199KB 255KB [ 1207.109559] sigqueue 132KB 322KB [ 1207.114925] kernfs_node_cache 9735KB 10028KB [ 1207.120322] mnt_cache 105KB 152KB [ 1207.125727] filp 3938KB 4597KB [ 1207.131120] names_cache 88808KB 88829KB [ 1207.136476] iint_cache 74KB 79KB [ 1207.141873] key_jar 4KB 11KB [ 1207.147256] uts_namespace 4KB 7KB [ 1207.177338] nsproxy 9KB 23KB [ 1207.182705] vm_area_struct 8684KB 13716KB [ 1207.210458] mm_struct 1649KB 2665KB [ 1207.215844] fs_cache 146KB 304KB [ 1207.255341] files_cache 498KB 911KB [ 1207.277537] signal_cache 931KB 1624KB [ 1207.282906] sighand_cache 365KB 423KB [ 1207.321207] task_struct 4003KB 4046KB [ 1207.326573] cred_jar 856KB 1680KB [ 1207.366023] anon_vma_chain 4282KB 5106KB [ 1207.388454] anon_vma 183KB 369KB [ 1207.393826] pid 49KB 120KB [ 1207.432522] Acpi-Operand 106KB 158KB [ 1207.449354] Acpi-Namespace 19KB 23KB [ 1207.454743] numa_policy 0KB 3KB [ 1207.499362] debug_objects_cache 1310KB 1366KB [ 1207.504905] trace_event_file 258KB 258KB [ 1207.541451] ftrace_event_field 372KB 374KB [ 1207.546929] pool_workqueue 76KB 84KB [ 1207.564462] task_group 5KB 7KB [ 1207.570580] page->ptl 2140KB 3020KB [ 1207.575966] kmalloc-4194304 4698112KB 4698112KB [ 1207.586752] kmalloc-2097152 2050KB 2050KB [ 1207.592246] kmalloc-524288 2056KB 2056KB [ 1207.597647] kmalloc-262144 1290KB 1290KB [ 1207.602995] kmalloc-131072 650KB 650KB [ 1207.608423] kmalloc-65536 3300KB 3696KB [ 1207.613770] kmalloc-32768 15939KB 16038KB [ 1207.619147] kmalloc-16384 1666KB 1683KB [ 1207.624498] kmalloc-8192 1963KB 1963KB [ 1207.629865] kmalloc-4096 16655KB 16694KB [ 1207.635217] kmalloc-2048 9150KB 10225KB [ 1207.640594] kmalloc-1024 4764KB 5985KB [ 1207.645936] kmalloc-512 4314KB 6026KB [ 1207.651321] kmalloc-256 2114KB 2880KB [ 1207.656677] kmalloc-128 933KB 1090KB [ 1207.662071] kmalloc-96 3360KB 3384KB [ 1207.667442] kmalloc-64 1348KB 1412KB [ 1207.672796] kmalloc-32 1558KB 1838KB [ 1207.678162] kmalloc-192 940KB 1204KB [ 1207.683515] kmem_cache 264KB 266KB [ 1207.688905] Out of memory: Kill process 21181 (syz-executor2) score 1004 or sacrifice child [ 1207.701152] Killed process 21181 (syz-executor2) total-vm:70472kB, anon-rss:2200kB, file-rss:32768kB, shmem-rss:0kB [ 1207.713642] oom_reaper: reaped process 21181 (syz-executor2), now anon-rss:0kB, file-rss:32768kB, shmem-rss:0kB [ 1208.223122] syz-executor4 invoked oom-killer: gfp_mask=0x6082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1208.275322] syz-executor4 cpuset=/ mems_allowed=0 [ 1208.293615] CPU: 1 PID: 21758 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #281 [ 1208.301003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1208.310354] Call Trace: [ 1208.312946] dump_stack+0x1c4/0x2b4 [ 1208.316705] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1208.321940] dump_header+0x27b/0xf72 [ 1208.325663] ? mark_held_locks+0x130/0x130 [ 1208.329899] ? pagefault_out_of_memory+0x197/0x197 [ 1208.334844] ? __lock_acquire+0x7ec/0x4ec0 [ 1208.339086] ? mem_cgroup_charge_statistics+0x780/0x780 [ 1208.344535] ? print_usage_bug+0xc0/0xc0 [ 1208.348597] ? print_usage_bug+0xc0/0xc0 [ 1208.352662] ? graph_lock+0x170/0x170 [ 1208.356467] ? print_usage_bug+0xc0/0xc0 [ 1208.360526] ? print_usage_bug+0xc0/0xc0 [ 1208.364601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1208.370144] ? find_held_lock+0x36/0x1c0 [ 1208.374212] ? mark_held_locks+0xc7/0x130 [ 1208.378360] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1208.383464] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1208.388561] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1208.393140] ? trace_hardirqs_on+0xbd/0x310 [ 1208.397474] ? kasan_check_read+0x11/0x20 [ 1208.401627] ? ___ratelimit+0x36f/0x655 [ 1208.405595] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1208.411044] ? trace_hardirqs_on+0x310/0x310 [ 1208.415454] ? lock_downgrade+0x900/0x900 [ 1208.419604] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1208.424707] ? ___ratelimit+0xaa/0x655 [ 1208.428604] ? idr_get_free+0xec0/0xec0 [ 1208.432582] ? kasan_check_write+0x14/0x20 [ 1208.436844] ? do_raw_spin_lock+0xc1/0x200 [ 1208.441176] oom_kill_process.cold.27+0x10/0x903 [ 1208.445928] ? graph_lock+0x170/0x170 [ 1208.449721] ? _raw_spin_unlock+0x2c/0x50 [ 1208.453866] ? oom_badness+0xe6/0xaa0 [ 1208.457667] ? oom_evaluate_task+0x540/0x540 [ 1208.462072] ? find_held_lock+0x36/0x1c0 [ 1208.466483] ? out_of_memory+0x974/0x1430 [ 1208.470630] ? lock_downgrade+0x900/0x900 [ 1208.474772] ? check_preemption_disabled+0x48/0x200 [ 1208.479788] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1208.485577] ? kasan_check_read+0x11/0x20 [ 1208.489737] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1208.495014] ? rcu_bh_qs+0xc0/0xc0 [ 1208.498553] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1208.503566] ? oom_evaluate_task+0x302/0x540 [ 1208.507977] out_of_memory+0xa84/0x1430 [ 1208.511950] ? unreserve_highatomic_pageblock+0x340/0x5d0 [ 1208.517483] ? oom_killer_disable+0x3a0/0x3a0 [ 1208.521973] ? __alloc_pages_slowpath+0xe76/0x2d80 [ 1208.526904] ? __mutex_add_waiter+0x2a0/0x2a0 [ 1208.531398] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1208.536411] ? find_next_bit+0x104/0x130 [ 1208.540479] __alloc_pages_slowpath+0x2318/0x2d80 [ 1208.545345] ? warn_alloc+0x120/0x120 [ 1208.549149] ? find_held_lock+0x36/0x1c0 [ 1208.553330] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1208.558879] ? should_fail+0x22d/0xd01 [ 1208.562763] ? is_bpf_text_address+0xac/0x170 [ 1208.567259] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1208.572368] ? rcu_bh_qs+0xc0/0xc0 [ 1208.575908] ? rcu_bh_qs+0xc0/0xc0 [ 1208.579478] ? __lock_is_held+0xb5/0x140 [ 1208.583549] ? ___might_sleep+0x1ed/0x300 [ 1208.587692] ? lock_release+0x970/0x970 [ 1208.591757] ? arch_local_save_flags+0x40/0x40 [ 1208.596342] ? __lock_is_held+0xb5/0x140 [ 1208.600406] ? __might_sleep+0x95/0x190 [ 1208.604380] __alloc_pages_nodemask+0xa80/0xde0 [ 1208.609049] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1208.614507] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 1208.619527] ? check_preemption_disabled+0x48/0x200 [ 1208.624559] ? __lock_is_held+0xb5/0x140 [ 1208.628637] ? ___might_sleep+0x1ed/0x300 [ 1208.632782] ? kasan_unpoison_shadow+0x35/0x50 [ 1208.637363] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1208.642906] alloc_pages_current+0x10c/0x210 [ 1208.647315] __vmalloc_node_range+0x498/0x750 [ 1208.651814] ? kcov_mmap+0x2e/0x150 [ 1208.655465] vmalloc_user+0x75/0x170 [ 1208.659198] ? kcov_mmap+0x2e/0x150 [ 1208.662835] kcov_mmap+0x2e/0x150 [ 1208.666306] mmap_region+0xe82/0x1cd0 [ 1208.670118] ? __x64_sys_brk+0x7d0/0x7d0 [ 1208.674188] ? graph_lock+0x170/0x170 [ 1208.677993] ? find_held_lock+0x36/0x1c0 [ 1208.682069] ? arch_get_unmapped_area+0x750/0x750 [ 1208.686911] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1208.691927] ? cap_mmap_addr+0x52/0x130 [ 1208.695904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1208.701439] ? security_mmap_addr+0x80/0xa0 [ 1208.705761] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1208.711311] ? get_unmapped_area+0x292/0x3b0 [ 1208.715720] do_mmap+0xa10/0x1220 [ 1208.719176] ? mmap_region+0x1cd0/0x1cd0 [ 1208.723233] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 1208.727311] ? down_read_killable+0x1f0/0x1f0 [ 1208.731811] ? security_mmap_file+0x174/0x1b0 [ 1208.736328] vm_mmap_pgoff+0x213/0x2c0 [ 1208.740237] ? vma_is_stack_for_current+0xd0/0xd0 [ 1208.745104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1208.750639] ? __fget_light+0x2e9/0x430 [ 1208.754614] ? fget_raw+0x20/0x20 [ 1208.758073] ksys_mmap_pgoff+0x4da/0x660 [ 1208.762131] ? do_syscall_64+0x9a/0x820 [ 1208.766179] ? find_mergeable_anon_vma+0xd0/0xd0 [ 1208.770930] ? trace_hardirqs_on+0xbd/0x310 [ 1208.775246] ? security_file_ioctl+0x94/0xc0 [ 1208.779655] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1208.785018] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1208.790471] __x64_sys_mmap+0xe9/0x1b0 [ 1208.794383] do_syscall_64+0x1b9/0x820 [ 1208.798285] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1208.803743] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1208.808677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1208.813528] ? trace_hardirqs_on_caller+0x310/0x310 [ 1208.818548] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1208.823570] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1208.828618] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1208.833467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1208.838653] RIP: 0033:0x4575ba [ 1208.841851] Code: Bad RIP value. [ 1208.845209] RSP: 002b:00007ffc01b6fdf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1208.852919] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004575ba [ 1208.860215] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1208.867484] RBP: 00000000000000f7 R08: 00000000000000f7 R09: 0000000000000000 [ 1208.874761] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1208.882025] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1208.904668] Mem-Info: [ 1208.914064] active_anon:102304 inactive_anon:109 isolated_anon:0 [ 1208.914064] active_file:55 inactive_file:65 isolated_file:32 [ 1208.914064] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1208.914064] slab_reclaimable:12333 slab_unreclaimable:1273310 [ 1208.914064] mapped:48665 shmem:118 pagetables:1410 bounce:0 [ 1208.914064] free:24436 free_pcp:39 free_cma:0 [ 1208.948040] Node 0 active_anon:409216kB inactive_anon:436kB active_file:220kB inactive_file:224kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:194660kB dirty:0kB writeback:0kB shmem:472kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 77824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1208.976293] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1209.002849] lowmem_reserve[]: 0 2819 6323 6323 [ 1209.007630] Node 0 DMA32 free:44020kB min:30060kB low:37572kB high:45084kB active_anon:2096kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1209.052376] lowmem_reserve[]: 0 0 3503 3503 [ 1209.065447] Node 0 Normal free:37608kB min:37352kB low:46688kB high:56024kB active_anon:407116kB inactive_anon:436kB active_file:116kB inactive_file:320kB unevictable:0kB writepending:0kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:5984kB pagetables:5636kB bounce:0kB free_pcp:88kB local_pcp:0kB free_cma:0kB [ 1209.094664] lowmem_reserve[]: 0 0 0 0 [ 1209.101654] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1209.117173] Node 0 DMA32: 5*4kB (ME) 2*8kB (M) 5*16kB (ME) 4*32kB (ME) 6*64kB (UME) 3*128kB (ME) 4*256kB (ME) 4*512kB (ME) 3*1024kB (ME) 4*2048kB (UME) 7*4096kB (M) = 44020kB [ 1209.133231] Node 0 Normal: 1119*4kB (UME) 408*8kB (UME) 79*16kB (UME) 34*32kB (UM) 19*64kB (UME) 4*128kB (UM) 3*256kB (UME) 7*512kB (UME) 15*1024kB (UM) 3*2048kB (M) 0*4096kB = 37676kB [ 1209.150310] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1209.159339] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1209.167974] 185 total pagecache pages [ 1209.171775] 0 pages in swap cache [ 1209.175226] Swap cache stats: add 0, delete 0, find 0/0 [ 1209.197363] Free swap = 0kB [ 1209.200399] Total swap = 0kB [ 1209.203407] 1965979 pages RAM [ 1209.206500] 0 pages HighMem/MovableOnly [ 1209.244191] 342307 pages reserved [ 1209.258240] 0 pages cma reserved [ 1209.261877] Unreclaimable slab info: [ 1209.266261] Name Used Total [ 1209.313212] pid_2 124KB 176KB [ 1209.336955] TIPC 12KB 21KB [ 1209.358488] SCTPv6 18KB 30KB [ 1209.363951] DCCPv6 14KB 29KB [ 1209.411340] DCCP 13KB 20KB [ 1209.416737] bridge_fdb_cache 13KB 27KB [ 1209.466843] fib6_nodes 90KB 136KB [ 1209.491901] ip6_dst_cache 123KB 315KB [ 1209.497273] RAWv6 87KB 97KB [ 1209.537786] UDPv6 3KB 3KB [ 1209.543161] TCPv6 20KB 23KB [ 1209.548543] nf_conntrack 0KB 7KB [ 1209.553895] sd_ext_cdb 0KB 3KB [ 1209.559262] scsi_sense_cache 1056KB 1060KB [ 1209.564599] virtio_scsi_cmd 16KB 16KB [ 1209.569956] sgpool-128 8KB 8KB [ 1209.575293] sgpool-64 4KB 6KB [ 1209.580648] sgpool-32 2KB 7KB [ 1209.585985] sgpool-16 1KB 3KB [ 1209.591433] sgpool-8 0KB 3KB [ 1209.596775] mqueue_inode_cache 12KB 21KB [ 1209.602234] bio_post_read_ctx 14KB 15KB [ 1209.607631] bio-2 14KB 15KB [ 1209.612982] jfs_mp 7KB 7KB [ 1209.618399] nfs_commit_data 3KB 7KB [ 1209.623894] nfs_write_data 34KB 37KB [ 1209.629392] jbd2_inode 1KB 3KB [ 1209.634804] ext4_system_zone 0KB 3KB [ 1209.640370] bio-1 1KB 3KB [ 1209.645723] pid_namespace 2KB 7KB [ 1209.651108] rpc_buffers 17KB 19KB [ 1209.656474] rpc_tasks 2KB 3KB [ 1209.672167] UNIX 19KB 29KB [ 1209.678797] tcp_bind_bucket 1KB 8KB [ 1209.696129] ip_fib_trie 13KB 23KB [ 1209.718714] ip_fib_alias 60KB 90KB [ 1209.724094] ip_dst_cache 1KB 8KB [ 1209.742281] RAW 51KB 86KB [ 1209.759062] UDP 19KB 32KB [ 1209.764430] TCP 8KB 16KB [ 1209.777212] hugetlbfs_inode_cache 2KB 7KB [ 1209.783005] fscache_cookie_jar 1KB 3KB [ 1209.800211] eventpoll_pwq 27KB 39KB [ 1209.805570] eventpoll_epi 51KB 70KB [ 1209.811017] inotify_inode_mark 47KB 70KB [ 1209.816462] request_queue 160KB 160KB [ 1209.821837] blkdev_requests 1KB 3KB [ 1209.827183] blkdev_ioc 60KB 65KB [ 1209.832551] bio-0 4008KB 4008KB [ 1209.837945] biovec-max 2582KB 2582KB [ 1209.843493] biovec-64 3638KB 3638KB [ 1209.848857] biovec-16 1035KB 1035KB [ 1209.854196] bio_integrity_payload 1KB 8KB [ 1209.859906] khugepaged_mm_slot 10KB 23KB [ 1209.865333] user_namespace 7KB 18KB [ 1209.870812] dmaengine-unmap-256 2KB 6KB [ 1209.876325] dmaengine-unmap-128 1KB 3KB [ 1209.881875] dmaengine-unmap-16 0KB 4KB [ 1209.887347] dmaengine-unmap-2 0KB 3KB [ 1209.892704] skbuff_fclone_cache 171KB 236KB [ 1209.898249] skbuff_head_cache 1749KB 2595KB [ 1209.903620] configfs_dir_cache 0KB 4KB [ 1209.909068] file_lock_cache 0KB 3KB [ 1209.914512] file_lock_ctx 0KB 3KB [ 1209.920517] fsnotify_mark_connector 27KB 39KB [ 1209.926405] net_namespace 69KB 69KB [ 1209.931775] shmem_inode_cache 4556KB 4690KB [ 1209.937129] task_delay_info 118KB 245KB [ 1209.942692] taskstats 108KB 149KB [ 1209.948066] proc_dir_entry 674KB 813KB [ 1209.953423] pde_opener 0KB 3KB [ 1209.958795] seq_file 195KB 255KB [ 1209.964134] sigqueue 121KB 322KB [ 1209.969516] kernfs_node_cache 9724KB 10017KB [ 1209.974859] mnt_cache 105KB 152KB [ 1209.980217] filp 3938KB 4597KB [ 1209.985555] names_cache 88825KB 88829KB [ 1209.990938] iint_cache 74KB 79KB [ 1209.996287] key_jar 4KB 11KB [ 1210.001661] uts_namespace 3KB 7KB [ 1210.006998] nsproxy 9KB 23KB [ 1210.012363] vm_area_struct 8682KB 13716KB [ 1210.017737] mm_struct 1641KB 2665KB [ 1210.023085] fs_cache 140KB 304KB [ 1210.028461] files_cache 488KB 903KB [ 1210.033823] signal_cache 928KB 1624KB [ 1210.040782] sighand_cache 353KB 416KB [ 1210.057549] task_struct 3997KB 4046KB [ 1210.064755] cred_jar 850KB 1680KB [ 1210.075135] anon_vma_chain 4280KB 5106KB [ 1210.081897] anon_vma 178KB 369KB [ 1210.097423] pid 48KB 120KB [ 1210.102878] Acpi-Operand 106KB 158KB [ 1210.116470] Acpi-Namespace 19KB 23KB [ 1210.121972] numa_policy 0KB 3KB [ 1210.138985] debug_objects_cache 1310KB 1366KB [ 1210.144726] trace_event_file 258KB 258KB [ 1210.161943] ftrace_event_field 372KB 374KB [ 1210.167556] pool_workqueue 75KB 84KB [ 1210.172948] task_group 5KB 7KB [ 1210.197411] page->ptl 2138KB 3020KB [ 1210.202797] kmalloc-4194304 4698112KB 4698112KB [ 1210.233176] kmalloc-2097152 2050KB 2050KB [ 1210.256190] kmalloc-524288 2056KB 2056KB [ 1210.279492] kmalloc-262144 1290KB 1290KB [ 1210.284863] kmalloc-131072 650KB 650KB [ 1210.316159] kmalloc-65536 3300KB 3696KB [ 1210.345391] kmalloc-32768 15939KB 16038KB [ 1210.367651] kmalloc-16384 1666KB 1683KB [ 1210.373034] kmalloc-8192 1963KB 1963KB [ 1210.401250] kmalloc-4096 16647KB 16685KB [ 1210.406623] kmalloc-2048 9139KB 10225KB [ 1210.456130] kmalloc-1024 4764KB 5985KB [ 1210.476886] kmalloc-512 4307KB 6026KB [ 1210.496390] kmalloc-256 2110KB 2880KB [ 1210.530252] kmalloc-128 924KB 1090KB [ 1210.535646] kmalloc-96 3360KB 3384KB [ 1210.579725] kmalloc-64 1345KB 1412KB [ 1210.585105] kmalloc-32 1556KB 1838KB [ 1210.590578] kmalloc-192 937KB 1204KB [ 1210.595921] kmem_cache 264KB 266KB [ 1210.601288] Out of memory: Kill process 21214 (syz-executor2) score 1004 or sacrifice child [ 1210.610886] Killed process 21214 (syz-executor2) total-vm:70472kB, anon-rss:2200kB, file-rss:32768kB, shmem-rss:0kB [ 1210.622830] oom_reaper: reaped process 21214 (syz-executor2), now anon-rss:0kB, file-rss:32768kB, shmem-rss:0kB [ 1211.571610] IPVS: ftp: loaded support on port[0] = 21 [ 1214.974077] IPVS: ftp: loaded support on port[0] = 21 [ 1215.483795] IPVS: ftp: loaded support on port[0] = 21 [ 1216.562261] bridge0: port 1(bridge_slave_0) entered blocking state [ 1216.568844] bridge0: port 1(bridge_slave_0) entered disabled state [ 1216.575974] device bridge_slave_0 entered promiscuous mode [ 1216.585486] bridge0: port 1(bridge_slave_0) entered blocking state [ 1216.592702] bridge0: port 1(bridge_slave_0) entered disabled state [ 1216.600544] device bridge_slave_0 entered promiscuous mode [ 1216.615279] bridge0: port 2(bridge_slave_1) entered blocking state [ 1216.621791] bridge0: port 2(bridge_slave_1) entered disabled state [ 1216.629237] device bridge_slave_1 entered promiscuous mode [ 1216.642841] bridge0: port 2(bridge_slave_1) entered blocking state [ 1216.649470] bridge0: port 2(bridge_slave_1) entered disabled state [ 1216.656726] device bridge_slave_1 entered promiscuous mode [ 1216.667467] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1216.698557] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1216.707217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1216.739279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1216.830658] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1216.863823] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1216.876071] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1216.908033] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1217.073210] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1217.080935] team0: Port device team_slave_0 added [ 1217.097005] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1217.106745] team0: Port device team_slave_0 added [ 1217.120209] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1217.128149] team0: Port device team_slave_1 added [ 1217.144149] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1217.151706] team0: Port device team_slave_1 added [ 1217.167946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1217.191706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1217.225014] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1217.300099] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1217.307982] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1217.315239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1217.324196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1217.332083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1217.339872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1217.378883] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1217.386367] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1217.400184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1217.408442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1217.416263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1217.424760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1217.441876] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1217.449067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1217.456901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1217.897429] bridge0: port 2(bridge_slave_1) entered blocking state [ 1217.903813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1217.910885] bridge0: port 1(bridge_slave_0) entered blocking state [ 1217.917243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1217.924529] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1217.965921] bridge0: port 2(bridge_slave_1) entered blocking state [ 1217.972307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1217.978920] bridge0: port 1(bridge_slave_0) entered blocking state [ 1217.985261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1217.992749] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1218.277480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1218.284948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1220.061628] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1220.169512] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1220.199747] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1220.309942] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1220.339926] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1220.346210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1220.353863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1220.467222] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1220.473849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1220.492971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1220.503337] 8021q: adding VLAN 0 to HW filter on device team0 [ 1220.694032] 8021q: adding VLAN 0 to HW filter on device team0 10:08:50 executing program 1: semget$private(0x0, 0x4007, 0xd000000) 10:08:50 executing program 0: semctl$GETALL(0x0, 0x173, 0xd, &(0x7f00000000c0)=""/214) 10:08:50 executing program 5: semget$private(0x0, 0x2, 0x0) 10:08:50 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x5c000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:51 executing program 0: semctl$GETALL(0x0, 0x4b000000, 0xd, &(0x7f00000000c0)=""/214) [ 1221.903371] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) 10:08:51 executing program 1: semget$private(0x0, 0x4007, 0xf201) 10:08:51 executing program 0: semctl$GETALL(0x0, 0xba, 0xd, &(0x7f00000000c0)=""/214) [ 1222.095122] blkid (22292) used greatest stack depth: 3976 bytes left 10:08:51 executing program 5: semget$private(0x0, 0x4007, 0x0) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) 10:08:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:51 executing program 1: semget$private(0x0, 0x4007, 0xde00) [ 1222.370761] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:51 executing program 0: semctl$GETALL(0x0, 0x3800000000000000, 0xd, &(0x7f00000000c0)=""/214) 10:08:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) [ 1222.540206] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1222.824412] IPVS: ftp: loaded support on port[0] = 21 10:08:52 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0x43, 0xd, &(0x7f00000000c0)=""/214) 10:08:52 executing program 5: semget$private(0x0, 0x4007, 0x0) semget$private(0x0, 0x4, 0x400) 10:08:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={"6e6174000000000000000000000000000000000000000000000300", 0x19, 0x1, 0x138, [0x20000700, 0x0, 0x0, 0x20000730, 0x20000760], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x1b0) [ 1223.357205] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING 10:08:52 executing program 5: semget$private(0x0, 0x4007, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x220080, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000040)) 10:08:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x2, 0x240, [0x20000700, 0x0, 0x0, 0x20000838, 0x20000868], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, "655f3000000000000000c100", 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [0xffffffffffffffff], @dev, [0x0, 0x0, 0xff], 0xa0, 0xd8, 0x108, [@pkttype={'pkttype\x00', 0x8, {{0x6}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x25, 0x0, 0x0, 'rose0\x00', "200000fa0000001300", 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [0x0, 0x1000000], @link_local, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x2b8) 10:08:52 executing program 3: r0 = semget$private(0x0, 0x4007, 0x0) semctl$GETALL(r0, 0xb9, 0xd, &(0x7f00000000c0)=""/214) [ 1223.544180] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 1223.561080] kasan: CONFIG_KASAN_INLINE enabled [ 1223.566200] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1223.573630] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1223.579950] CPU: 1 PID: 10388 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #281 [ 1223.587315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1223.596679] RIP: 0010:put_pid.part.2+0xb6/0x240 [ 1223.598733] kobject: 'loop3' (00000000a88c2f60): kobject_uevent_env [ 1223.601344] Code: d2 0f 85 89 01 00 00 44 8b 63 04 49 8d 44 24 03 48 c1 e0 04 48 8d 7c 03 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 66 01 00 00 49 83 c4 03 be 04 00 00 00 48 89 df [ 1223.619274] kobject: 'loop3' (00000000a88c2f60): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1223.626810] RSP: 0018:ffff8801c5def1f0 EFLAGS: 00010202 [ 1223.626822] RAX: dffffc0000000000 RBX: ffffffff816070d0 RCX: ffffffff8339697e [ 1223.626832] RDX: 00000001933e9062 RSI: ffffffff8152688e RDI: 0000000c99f48310 [ 1223.656128] RBP: ffff8801c5def280 R08: ffff88018456c640 R09: fffff5200272c200 [ 1223.663406] R10: fffff5200272c200 R11: ffffc90013961003 R12: 00000000d1894120 [ 1223.670668] R13: 1ffff10038bbde3f R14: ffff8801c5def258 R15: dffffc0000000000 [ 1223.677945] FS: 00000000025cc940(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1223.686155] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1223.692132] CR2: 0000000000619570 CR3: 00000001af510000 CR4: 00000000001406e0 [ 1223.699397] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1223.706650] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1223.713910] Call Trace: [ 1223.716482] ? pid_task+0x200/0x200 [ 1223.720094] ? rcu_bh_qs+0xc0/0xc0 [ 1223.723623] ? print_usage_bug+0xc0/0xc0 [ 1223.727666] ? print_usage_bug+0xc0/0xc0 [ 1223.731709] put_pid+0x1f/0x30 [ 1223.734902] freeary+0x10c8/0x1a40 [ 1223.738427] ? kasan_check_write+0x14/0x20 [ 1223.742647] ? newary+0xb40/0xb40 [ 1223.746092] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1223.751350] ? call_rcu+0x12/0x20 [ 1223.754813] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1223.760245] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1223.765764] ? check_preemption_disabled+0x48/0x200 [ 1223.770779] ? radix_tree_descend+0x13c/0x2e0 [ 1223.775253] ? plist_requeue+0x620/0x620 [ 1223.779290] ? rcu_is_watching+0x30/0x30 [ 1223.783343] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1223.788438] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1223.793551] ? trace_hardirqs_on+0xbd/0x310 [ 1223.797859] ? kasan_check_read+0x11/0x20 [ 1223.801988] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1223.807595] ? __radix_tree_lookup+0x358/0x4c0 [ 1223.812162] ? lock_acquire+0x1ed/0x520 [ 1223.816131] ? free_ipcs+0x8f/0x1c0 [ 1223.819739] ? free_ipcs+0xd4/0x1c0 [ 1223.823347] ? lock_release+0x970/0x970 [ 1223.827303] ? kasan_check_read+0x11/0x20 [ 1223.831438] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1223.836697] ? kasan_check_write+0x14/0x20 [ 1223.840942] ? do_raw_spin_lock+0xc1/0x200 [ 1223.845176] free_ipcs+0x9f/0x1c0 [ 1223.848612] ? newary+0xb40/0xb40 [ 1223.852051] sem_exit_ns+0x20/0x40 [ 1223.855576] put_ipc_ns+0x66/0x180 [ 1223.859101] free_nsproxy+0xcf/0x220 [ 1223.862797] switch_task_namespaces+0xb3/0xd0 [ 1223.867274] exit_task_namespaces+0x17/0x20 [ 1223.871579] do_exit+0x1ad2/0x2610 [ 1223.875130] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1223.879695] ? timespec64_trunc+0x111/0x180 [ 1223.884000] ? mm_update_next_owner+0x990/0x990 [ 1223.888653] ? graph_lock+0x170/0x170 [ 1223.892437] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1223.897432] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 1223.902620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1223.908150] ? timespec64_trunc+0xea/0x180 [ 1223.912370] ? inode_init_owner+0x340/0x340 [ 1223.916680] ? __wake_up_common_lock+0x1d0/0x330 [ 1223.921420] ? find_held_lock+0x36/0x1c0 [ 1223.925462] ? pipe_write+0xaf1/0xec0 [ 1223.929245] ? lock_downgrade+0x900/0x900 [ 1223.933375] ? __lock_is_held+0xb5/0x140 [ 1223.937420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1223.942943] ? check_preemption_disabled+0x48/0x200 [ 1223.947952] ? __sb_end_write+0xd9/0x110 [ 1223.952008] ? pipe_write+0xb64/0xec0 [ 1223.955793] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1223.961317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1223.966836] ? fsnotify+0xaae/0x12f0 [ 1223.970534] ? fsnotify_first_mark+0x350/0x350 [ 1223.975110] ? __fsnotify_parent+0xcc/0x420 [ 1223.979415] ? fsnotify+0x12f0/0x12f0 [ 1223.983196] ? apparmor_file_permission+0x24/0x30 [ 1223.988051] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1223.993572] ? vfs_write+0x2ad/0x560 [ 1223.997268] do_group_exit+0x177/0x440 [ 1224.001138] ? trace_hardirqs_on+0xbd/0x310 [ 1224.005455] ? __ia32_sys_exit+0x50/0x50 [ 1224.009515] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1224.014948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1224.020469] __x64_sys_exit_group+0x3e/0x50 [ 1224.024772] do_syscall_64+0x1b9/0x820 [ 1224.028641] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1224.033989] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1224.038902] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1224.043850] ? trace_hardirqs_on_caller+0x310/0x310 [ 1224.048969] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1224.054069] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1224.058915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1224.064114] RIP: 0033:0x457569 [ 1224.067292] Code: Bad RIP value. [ 1224.070645] RSP: 002b:0000000000a3fc88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 1224.078333] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457569 [ 1224.085685] RDX: 0000000000410f40 RSI: 0000000000a44bf0 RDI: 0000000000000045 [ 1224.092951] RBP: 00000000004bcf74 R08: 000000000000000c R09: 0000000000000000 [ 1224.100216] R10: 00000000025cc940 R11: 0000000000000246 R12: 0000000000000000 [ 1224.107469] R13: 0000000000000001 R14: 0000000000000173 R15: 0000000000000001 [ 1224.114811] Modules linked in: [ 1224.118066] ---[ end trace dca4f33c5c905129 ]--- [ 1224.122823] RIP: 0010:put_pid.part.2+0xb6/0x240 [ 1224.127519] Code: d2 0f 85 89 01 00 00 44 8b 63 04 49 8d 44 24 03 48 c1 e0 04 48 8d 7c 03 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 66 01 00 00 49 83 c4 03 be 04 00 00 00 48 89 df [ 1224.145206] IPVS: ftp: loaded support on port[0] = 21 [ 1224.146453] RSP: 0018:ffff8801c5def1f0 EFLAGS: 00010202 [ 1224.157008] RAX: dffffc0000000000 RBX: ffffffff816070d0 RCX: ffffffff8339697e [ 1224.163210] kobject: 'loop4' (00000000baef0bd9): kobject_uevent_env [ 1224.164308] RDX: 00000001933e9062 RSI: ffffffff8152688e RDI: 0000000c99f48310 [ 1224.178018] RBP: ffff8801c5def280 R08: ffff88018456c640 R09: fffff5200272c200 [ 1224.180048] kobject: 'loop4' (00000000baef0bd9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1224.185282] R10: fffff5200272c200 R11: ffffc90013961003 R12: 00000000d1894120 [ 1224.185294] R13: 1ffff10038bbde3f R14: ffff8801c5def258 R15: dffffc0000000000 [ 1224.185308] FS: 00000000025cc940(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1224.199453] kobject: 'lo' (00000000bc1eaed5): kobject_add_internal: parent: 'net', set: 'devices' [ 1224.202147] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1224.210202] kobject: 'lo' (00000000bc1eaed5): kobject_uevent_env [ 1224.217856] CR2: 000000000045753f CR3: 000000000926a000 CR4: 00000000001406e0 [ 1224.217867] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1224.217879] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1224.227413] kobject: 'loop5' (000000007f7f04e6): kobject_uevent_env [ 1224.232752] Kernel panic - not syncing: Fatal exception [ 1224.239031] kobject: 'lo' (00000000bc1eaed5): fill_kobj_path: path = '/devices/virtual/net/lo' [ 1224.254500] Kernel Offset: disabled [ 1224.285855] Rebooting in 86400 seconds..