up_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x40049409) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:18 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8848, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x91ffffff}}, 0x1c) 08:12:18 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xe000000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:18 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x12, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2855.524750] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:19 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x300000000000000}}, 0x1c) 08:12:19 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x6000, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:19 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xd, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2855.660179] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2855.839254] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2855.872166] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:19 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x5421) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x5000000000000000}}, 0x1c) 08:12:19 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xffffffff00000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:19 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8060000, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:19 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:19 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4000, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2856.250427] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:19 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x32, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x900000000000000}}, 0x1c) 08:12:19 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xe0000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:19 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4305000000000000, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2856.479726] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:20 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:20 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14000000, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xcbacb0ef00000000}}, 0x1c) 08:12:20 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x4, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:20 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x500, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:20 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xe000000}}, 0x1c) [ 2856.946272] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:20 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x2f, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:20 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x7000000, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:20 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3580, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:20 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:20 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x7, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2857.238598] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:20 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x5451) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xff000000}}, 0x1c) 08:12:20 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4788, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:20 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2000000, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:20 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x29, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:20 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2857.508942] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:21 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x14, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:21 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x500}}, 0x1c) 08:12:21 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4305000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2857.669759] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2857.833442] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2857.863928] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:21 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x660c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:21 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x6, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:21 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:21 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x6, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x20000}}, 0x1c) 08:12:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:21 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x2e, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:21 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2858.132729] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xe00000000000000}}, 0x1c) 08:12:21 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3f000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:21 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x2d, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2858.317553] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:22 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x40106614) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:22 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xe000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x900}}, 0x1c) 08:12:22 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x88640000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:22 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x3, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:22 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x806000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x4000000}}, 0x1c) 08:12:22 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000001, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2858.703671] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:22 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:22 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000003, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2858.934941] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xf0ffffff7f0000}}, 0x1c) 08:12:22 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x2, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:22 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8906000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:22 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:22 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x401c5820) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2859.374894] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:22 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8848000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:22 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:22 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3f00000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x50000}}, 0x1c) 08:12:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:23 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x2000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2859.575750] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:23 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:23 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x5}}, 0x1c) 08:12:23 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xfffff000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2859.749277] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2859.794049] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:23 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x80086603) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:23 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x500, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:23 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xc0fe}}, 0x1c) 08:12:23 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:23 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x80350000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:23 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8100, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2860.059694] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:23 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:23 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x40000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x4000000000000000}}, 0x1c) 08:12:23 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:23 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x600, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2860.264582] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:24 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xfc00000000000000}}, 0x1c) 08:12:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:24 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x600, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:24 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1c000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:24 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x660a) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:24 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x806, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2860.739985] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:24 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:24 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xf5ffffff}}, 0x1c) 08:12:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2860.942208] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:24 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3580, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:24 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x6000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:24 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x700}}, 0x1c) [ 2861.089154] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:24 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:24 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6611) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:24 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x60, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:24 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x400000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xfc00}}, 0x1c) 08:12:24 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:24 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88640000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2861.444136] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:24 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x7}}, 0x1c) [ 2861.489380] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:24 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xd000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:25 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2861.677142] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xff0f}}, 0x1c) 08:12:25 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xd00, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:25 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8060000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:25 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x80086601) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:25 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2862.120262] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xfffffff5}}, 0x1c) 08:12:25 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:25 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xe80, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:25 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1400, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2862.294451] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:25 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:25 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffffff00000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x6}}, 0x1c) 08:12:25 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x6488, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2862.467050] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:26 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x40086604) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:26 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:26 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:26 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x4000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:26 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8848000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xfe80000000000000}}, 0x1c) 08:12:26 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2862.724885] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:26 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8864000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:26 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8035, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:26 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2862.834326] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2862.908684] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:26 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:26 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x543, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:26 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x40086607) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:26 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:26 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x86ddffff00000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:26 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:26 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffca88, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2863.329112] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x91ffffff00000000}}, 0x1c) 08:12:26 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x300000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:26 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:26 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:26 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xffffdd86, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:27 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x6000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2863.567734] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x54000000}}, 0x1c) 08:12:27 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0xc0c0583b) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:27 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x88caffff, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:27 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:27 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffa888, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xa000000}}, 0x1c) [ 2863.966445] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xa00}}, 0x1c) 08:12:27 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:27 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88a8ffff00000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:27 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x88a8ffff, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:27 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2864.195215] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:27 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x4030582a) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xf401}}, 0x1c) 08:12:27 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xf000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:27 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:27 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2864.499183] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:27 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x300, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xa49db6b7}}, 0x1c) 08:12:27 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:28 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x4305, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:28 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2864.704922] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:28 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6610) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x218}}, 0x1c) 08:12:28 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x7, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:28 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:28 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x7000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:28 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2865.181260] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:28 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xe0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xa}}, 0x1c) 08:12:28 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8035, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2865.300695] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:28 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xd000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2865.503599] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:29 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x5450) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:29 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:29 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xd00, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x80000000000000}}, 0x1c) 08:12:29 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x2000000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:29 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xd00000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2865.770493] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:29 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x88caffff00000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:29 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x2000000000000}}, 0x1c) 08:12:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:29 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x1c000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2865.980293] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:29 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x4b49) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xfc000000}}, 0x1c) 08:12:29 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x806, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:29 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:29 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x800e0000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x800000}}, 0x1c) 08:12:29 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2866.360930] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:29 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3f00000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:29 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8100000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x600}}, 0x1c) [ 2866.584666] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:30 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x40086602) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:30 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x89060000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:30 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:30 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xfffff000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:30 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x4800}}, 0x1c) [ 2866.952235] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x4000}}, 0x1c) 08:12:30 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:30 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:30 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x800e0000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:30 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x40000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2867.137851] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:30 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xb2b89da4}}, 0x1c) 08:12:31 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8847, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:31 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:31 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1c, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:31 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x801c581f) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:31 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2867.699721] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:31 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xe80, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:31 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:31 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xa49db8b2}}, 0x1c) 08:12:31 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3f00, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:31 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2867.916135] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:31 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x543, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:31 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xb7b69da400000000}}, 0x1c) 08:12:31 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x5, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2868.076522] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:31 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x40087602) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:31 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:31 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8864000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:31 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1c00000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x3000000}}, 0x1c) 08:12:31 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2868.443950] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:31 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x20000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:31 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:31 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x60, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:31 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x8000000}}, 0x1c) 08:12:32 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8847000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2868.673679] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:32 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x40086610) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0xfec0}}, 0x1c) 08:12:32 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffdd86, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:32 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:32 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x700, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0xd}}, 0x1c) [ 2869.100429] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:32 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4000000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:32 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x4888, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:32 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x10002}}, 0x1c) [ 2869.310814] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:33 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0xc0045878) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:33 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:33 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x800000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:33 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:33 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x60000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x6}}, 0x1c) 08:12:33 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:33 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x500000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2869.853903] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x300}}, 0x1c) 08:12:33 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x3a, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:33 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:33 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2870.096788] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:33 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x660d) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0xa}}, 0x1c) 08:12:33 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x14000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:33 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:33 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:33 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x8}}, 0x1c) [ 2870.591504] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:34 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2b, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:34 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:34 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3f000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2870.658051] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:34 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x4e}}, 0x1c) [ 2870.857839] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:34 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[], 0xfffffffffffffeef) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000)="b61d7bc7ad1ae31f3dd6025ade4c7f0f74f522c72e6ac81de206861983e7eab12d8094f8513ca368764607ba5d23ea1142807744610996ec2330ed485cdcdd6146ceb7c124d30e0d5ff3eefbd90161a6458e51dc8852ea76bfc38c3f94ddfac1d5e68c17c9b212a2ddbd3d87346732d5b7a6", &(0x7f0000000180)=""/247}, 0x18) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:34 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:34 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88480000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:34 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x3, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:34 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x5}}, 0x1c) [ 2871.165098] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:34 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x4000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:34 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x42}}, 0x1c) 08:12:34 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:34 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x3e8, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:34 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8060000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2871.370679] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:35 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:35 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x10003}}, 0x1c) 08:12:35 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:35 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8864, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:35 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x3c, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2872.069625] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x7}}, 0x1c) 08:12:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:35 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xf0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:35 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:35 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={0x0, 0xef1}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={r1, @in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x40, 0x5, 0x6, 0x20}, &(0x7f00000003c0)=0x98) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', 0xfffffffffffffffa) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000006c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20004000}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1f0, r3, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'syzkaller0\x00'}}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x99c}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe336dc7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x947}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7bdf}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x7fffffff, @local, 0xfff}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1c3e, @local, 0x8}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xc}}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x8, @mcast1, 0x25}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x643}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x4008001}, 0x20000000) r4 = request_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='memory.events\x00', 0xfffffffffffffffb) request_key(0x0, 0x0, 0x0, r4) write$P9_RSTAT(r0, &(0x7f0000000200)={0x5f, 0x7d, 0x1, {0x0, 0x58, 0xcea, 0x3, {0x32, 0x0, 0x4}, 0x10040000, 0x5, 0xba, 0x692d, 0xe, 'memory.events\x00', 0x7, 'eth0/\x9c}', 0x8, 'big_key\x00', 0x8, 'big_key\x00'}}, 0x5f) [ 2872.245369] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0xb}}, 0x1c) 08:12:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:35 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x8, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:35 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:35 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x14, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2872.394077] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x4}}, 0x1c) 08:12:36 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2872.545111] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:36 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:36 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x2000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2872.732077] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:36 executing program 5: r0 = getpgid(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) setpgid(r0, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x4a0000, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) socketpair(0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x4a}}, 0x1c) 08:12:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:36 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:36 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:36 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88caffff, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:36 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x86ddffff, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x501}}, 0x1c) 08:12:36 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2873.024712] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:36 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x4, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2873.081850] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:36 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:36 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:36 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x9}}, 0x1c) 08:12:36 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xa, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:36 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x800e000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:36 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2873.596785] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x2}}, 0x1c) 08:12:37 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x4788, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:37 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:37 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:37 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88caffff00000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2873.924816] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2873.975020] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:37 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:37 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x3}}, 0x1c) 08:12:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:37 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) getuid() getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xa0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000180)={{0x2, 0xf11f}, 'port0\x00', 0x1, 0x20004, 0x9, 0x81, 0x4, 0x6fb9, 0x7, 0x0, 0x7, 0xd483}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:37 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8906, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2874.145447] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:37 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x21, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:37 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xff000000}, 0x1c) 08:12:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:37 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:37 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) sendmsg$nl_crypto(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x204}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@get={0x108, 0x13, 0x8, 0x70bd27, 0x25dfdbfe, {{'cmac(camellia)\x00'}, [], [], 0x2000, 0x400}, [{0x8, 0x1, 0xffffffff}, {0x8, 0x1, 0xc09}, {0x8, 0x1, 0x8}, {0x8, 0x1, 0x74}, {0x8, 0x1, 0x2}]}, 0x108}, 0x1, 0x0, 0x0, 0x4000}, 0x40) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:37 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2874.357582] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xf401}, 0x1c) 08:12:37 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2c, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:37 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x4, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2874.518488] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:37 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:38 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff84, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xffffff8d}, 0x1c) 08:12:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:38 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x89060000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:38 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2874.784232] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:38 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x3e, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xb7b69da400000000}, 0x1c) 08:12:38 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:38 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000000)={0x6, 0x5, 0xf04a, 0x2, 'syz1\x00', 0x6}) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:38 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xf0ffff, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2875.204297] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x20000000000}, 0x1c) 08:12:38 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:38 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x3580, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:38 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x6488, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2875.336476] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:38 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x200000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:38 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x4000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:38 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xeffdffff00000000}, 0x1c) [ 2875.538562] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:39 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x18) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='vmnet0\x00', 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='memory.events\x00', 0x0) request_key(0x0, 0x0, 0x0, r2) 08:12:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:39 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x700000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:39 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x88caffff, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:39 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x3f000000}, 0x1c) [ 2875.754788] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:39 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x80350000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xf401000000000000}, 0x1c) 08:12:39 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x400000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:39 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2875.915173] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:39 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x300, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x50}, 0x1c) 08:12:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:39 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xf000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:39 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:39 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8847, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:39 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x1, 0x0) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x84000) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='pids.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) r3 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) write(r3, &(0x7f0000000080)=')', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r3, 0x0) ftruncate(r3, 0xa00002) sendfile(r3, r3, &(0x7f0000000040), 0xff8) getsockopt(r3, 0x5, 0x1ff, &(0x7f0000001a40)=""/23, &(0x7f0000001a80)=0x17) mq_unlink(&(0x7f0000000000)='\x88])+\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="99000000f550db1fd20500327f25d566ae1e595f216c91899de9c7dd6dd5429db77a612612616555300a9179b18977fdceb3a195ed28b1c10f99f3ed4fee0422a90ad3d06177e98a0d7b972ae4c8805a0b50d3cda32c9749d891bedb14b863e30e29439b14aed1f055f020de6888410243774c65fcbf552ce347adae7ddf6cb23a825ad3c3a076a0350ca18d5799ebe4ca5eca36667c9b01c394ff70ea"], &(0x7f0000000240)=0xa1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e22, 0xffffffff, @remote, 0x1f}}, 0xff, 0x101, 0xffffffffffffff81, 0xda1, 0xffffffffffff3ec9}, &(0x7f0000000340)=0x98) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) sendmsg$xdp(r3, &(0x7f0000001a00)={&(0x7f0000000540)={0x2c, 0x4, r5, 0x1b}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000580)="59323f40330d85fdc30bd47bb5d92708129b6b297fcc2c408fb0e5821ddc5dd7071a9cb96f8eafaa267fbcb455b07b8aaea2793132ca39779461249e4dcdcca06f41619f16d269206b5c78ce576a77f4e7b9ad8135029fc35886dd6eb388e22a94918065eec4ed04cd1f22bb2d462886a97a7d4c3cbb495e1bc46fcd2f3d9f9830467f4ffbb8dc59dffbd40becc01b5eceb4cc67580f6e7a82378a0686c9e2976f7625930797c61afb7da61fd4650d4a15f6d16ce258845209a1ac3dd69bc36dc184daeafd807267bd2dd7b878a646cf12e416926be2f3a54cb0408d5e0c4f32b441fc318f45db", 0xe7}, {&(0x7f0000000680)="1c4a84d07f0a8de8089beb3e7c82032fe8daf9d7b0fdc36dd1fbb96122018ac97c7c4720a1372e8fbb0d1b3bcddcf12f4d5f743f709ad97f98e95ee9bbd9bbdb4adad3f8fc2f725c4c1bdf44f45ec87fdfde21e73918747680e6077467f0f1f68736ffb322fdab01bb13288dcf37d40cf265f6082c878edba6fc703a2449ce2c573fe69d12efa62cbb642e6f1ef955a0ecc6e7c4900017685592059f9e57885f5f837b012ef4885024e8d83cba20d12b60d0ca41edffa67b634946c5c2a8fcdc0b4da6fd6917a311047c2c", 0xcb}, {&(0x7f0000000780)="79c6b40d9b7067d1df1467bc687afbf0293d295308df0f6db957252366bfa6fb7d3e75fa10fe7151de72d491d2470b0cf57c963187b025b712293b6fdf14b78f81545ab303b305c1e4f0c9407e293f3cbe36f841e7f6d5ced4e6fa5e9ee9f2f9cca40b62dd237fdd0d95a89f6fcdfc2ce55dd445f26c3c8dbd2b306bfa335886655c487edc7e00aa8e5e96352a750249c4", 0x91}, {&(0x7f0000000840)="adffc1cd19839213285020cbd6542e431dc29a7c30ea41ee21ae8a9342a888a73e1e113e22f90426c89c7bb3fab4ae741c43741a0a42e62af2dd19447912554276624f3fa2919a875d3f1732b8acfdad5048a19d36eaef3bbb415d267c49fab83b4236d4b853fd984ce6881a2fda4bbed58928fea82377f2", 0x78}, {&(0x7f00000008c0)="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", 0x1000}, {&(0x7f00000018c0)="6445168739e1c49bfaa347d1064a", 0xe}, {&(0x7f0000001900)="7200fe02bb14dff616ca332930fd32092aafb3639bc3bffd2ced5c5a0c78e470f14e30d9143522fa9be6b10249bcdb73cb46d03e12e87b91bd005d4fa851bd1881a0fd3e660eb10b3360e1ed86e60d7ee2c3beb5aa42974bf2e44eca8c97a916ed", 0x61}], 0x7, 0x0, 0x0, 0x1}, 0x1) 08:12:39 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2876.355399] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2876.386800] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:39 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xd, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x80000000000000}, 0x1c) 08:12:39 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x14, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:40 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:40 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2876.564874] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:40 executing program 5: setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:40 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x60000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:40 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x60000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2876.654622] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x91ffffff00000000}, 0x1c) 08:12:40 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:40 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:40 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x88640000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:40 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x300, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2876.862778] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x800000000000000}, 0x1c) 08:12:40 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x3, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:40 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:40 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2877.082763] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:40 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x500000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:40 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x689, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:40 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xe803}, 0x1c) 08:12:40 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f0000000180), r1, 0x2}}, 0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:40 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x240}, 0x1c) [ 2877.501235] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:40 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:41 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xe0000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:41 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8035, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2877.569172] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:41 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:41 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:41 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x86ddffff00000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:41 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xffffdd86, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2877.765471] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xe00000000000000}, 0x1c) 08:12:41 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2877.906664] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:41 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) mmap$xdp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000004, 0x100010, r1, 0x180000000) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:41 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x100000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:41 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xa00000000000000}, 0x1c) 08:12:41 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8906000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:41 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2878.339715] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x400000000000000}, 0x1c) 08:12:41 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:41 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x600000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:41 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x543, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:41 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2878.507929] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:42 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8864000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2878.572914] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2878.781239] audit: type=1800 audit(1545120762.182:1475): pid=14744 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="memory.events" dev="sda1" ino=17153 res=0 08:12:42 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x5000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xff0f}, 0x1c) 08:12:42 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:42 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x400000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:42 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:42 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2878.891506] audit: type=1800 audit(1545120762.292:1476): pid=14744 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="memory.events" dev="sda1" ino=17153 res=0 08:12:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfc00}, 0x1c) 08:12:42 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8848, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2878.983076] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:42 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x6000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:42 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:42 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:42 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2879.173147] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x500}, 0x1c) 08:12:42 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:42 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xe80, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:42 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x800e, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2879.323486] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:43 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:43 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:43 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:43 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x6, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x91ffffff}, 0x1c) 08:12:43 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x2000000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2879.698933] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:43 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x4000000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:43 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x88a8ffff00000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x50000000}, 0x1c) 08:12:43 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:43 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:43 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x6000000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2879.943015] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfc000000}, 0x1c) 08:12:43 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x800000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:43 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x608, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:43 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:43 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2880.326763] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:43 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xe0000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:43 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x7000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x700}, 0x1c) 08:12:43 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:43 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:44 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x1000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2880.533926] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x5400}, 0x1c) 08:12:44 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x1c000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:44 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:44 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:44 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000180)={0x8000, 0x3, 0x3, {0x2, @sdr={0x20323159}}}) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x21, 0x16, 0x15, 0x15, 0x8, 0x0, 0x1, 0x154}) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) creat(&(0x7f0000000100)='./file0\x00', 0x2e) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0x0, 0x1, {0x59}}, 0x18) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) prctl$PR_SET_SECUREBITS(0x1c, 0x1000000000) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:44 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x43050000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:44 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8035000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2880.972736] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfe80}, 0x1c) 08:12:44 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:44 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x81000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:44 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:44 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x4000000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:44 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x80350000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:44 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2881.207389] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x40020000}, 0x1c) 08:12:44 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2881.418118] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:45 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r1, 0x2}, 0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:45 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x1c, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:45 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8906000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:45 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x5000000}, 0x1c) 08:12:45 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2881.728914] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:45 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:45 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x86ddffff, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:45 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8035000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xeffdffff}, 0x1c) 08:12:45 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:45 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2881.958607] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:45 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x1c00, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:45 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8864, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x800000}, 0x1c) 08:12:45 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:45 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x40a00, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000380)='memory\xc0\xd3\xa8y\xc0)R\x9d', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={@remote, @mcast2, @empty, 0x7f000000, 0x7, 0x6, 0x500, 0xfffffffffffffe01, 0x820200, r3}) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:45 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:45 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xe000000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2882.427123] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:45 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:45 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x5000000000000}, 0x1c) 08:12:45 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x60, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:46 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x30, 0x10}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={r1, 0x6, 0x30, 0x4, 0x4}, &(0x7f0000000540)=0x18) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000180)={0x6, {{0x2, 0x4e23, @loopback}}, 0x0, 0x6, [{{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e21, @empty}}, {{0x2, 0x4e22, @local}}]}, 0x390) [ 2882.565942] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:46 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x806000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:46 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:46 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x689, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:46 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2882.751417] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x5000000000000000}, 0x1c) 08:12:46 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x700, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:46 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:46 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:46 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x6000000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xb2b89da4}, 0x1c) 08:12:46 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xfffffffffffff000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2882.985173] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:46 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:46 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:46 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:46 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:46 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x1400, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x40000000}, 0x1c) [ 2883.446574] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:46 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:46 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8906, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:46 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8847000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:46 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfffffdef}, 0x1c) [ 2883.625241] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:47 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:47 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x80000000000004) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:47 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:47 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8100000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:47 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xffffa888, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x7ffffffff000}, 0x1c) 08:12:47 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2884.115768] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:47 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x2830811bd26}, 0x1c) 08:12:47 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x43050000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:47 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:47 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x4305000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2884.283426] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x48}, 0x1c) 08:12:48 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xfffffffffffffff9) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000000)={0xa, 0x5, 0x8}) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:48 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:48 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88a8ffff, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:48 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xf0, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:48 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x9}, 0x1c) [ 2884.870670] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:48 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88470000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xefb0accb}, 0x1c) 08:12:48 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x4888, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:48 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:48 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2885.057121] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xb2b89da400000000}, 0x1c) [ 2885.099860] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:48 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x57, "6cc329da191a73374ab2909ccecbce42438186c26321f5112028a60392a6ca161ec49ac0a317d986e4a4ad28743d99bb9e14510ffcfa356bd7b8aa3508d3c2827a4d7d5b8b49a496ef2f404cfdc39dc9faa2f779693859"}, &(0x7f0000000280)=0x5f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000002c0)={0x3, 0x3, 0x204, 0x8, 0xfffffffffffff5ce, 0xffffffffffffffff, 0x800, 0x1f, r1}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x5, 0x4, 0x6, 0x8}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000140)={r4, @in6={{0xa, 0x4e24, 0x1f, @local, 0x4}}}, 0x84) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:48 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x1400000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:48 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:48 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x1000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:48 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x500000000000000}, 0x1c) [ 2885.504404] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:49 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:49 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xf0ffffffffffff, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:49 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8848000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x4002}, 0x1c) 08:12:49 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:49 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) tgkill(r2, r3, 0x1000) 08:12:49 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x6000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:49 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x86ddffff00000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2885.732674] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:49 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x4800}, 0x1c) 08:12:49 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:49 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x1400000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:49 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2885.958897] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:49 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xe}, 0x1c) 08:12:49 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x1c00000000000000, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2886.100639] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:49 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x800e0000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:49 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[0x1, 0x101, 0x400]}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:49 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:49 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:49 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xc0fe}, 0x1c) 08:12:49 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88a8ffff00000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:49 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x806, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:50 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x1c00000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2886.550549] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:50 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xe803000000000000}, 0x1c) 08:12:50 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x500, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2886.748292] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:50 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xe000000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:50 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x20000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x200000000000000}, 0x1c) 08:12:50 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:50 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x40, 0xa, &(0x7f0000001700)=[{&(0x7f0000000180)="778e48e578fd8b5eaf15928af1a593d73cfa0585fc009c090ef2b9017793c800bc78ce033ff2dc7f9c582d35166f6b8de5ef85989fdac2982105c1bdeaa7c89254db37122586e606935cafb07068effb65f74c3dc4ef9f1b769d678a27a442778b5e4c27fce1e61a499f0326da72412fefb2ee5dfc3d93c017a4f85791a8bfe07bafd91fedc9c877ba913892aa07db92a687506b94655bd0ae44b20b7f27d9035c1ea7913970da92136515857bc079aa5ede70fe85bf579180e7a185a3f95d78ba4408b4df73b5299bcd950aa82b79245f03b0277348d10a8e83a02e9d9b4ef550a7b424d48511aff10c5b", 0xeb}, {&(0x7f0000000280)="34dd838e88c25c83c420cb327910e49b6f504e02d7bc63a3e7a7fb9c3355085eec707ee1665597ba550fc048b9d9901dfd6e1fe25bd4c33dd1f9135509ee016e65e2a33a0aaf6dfb44b5ccdf56c9b9fe78abd1483dc3065a516c86f86e2777a08386b7304b0ba3fe5ea6c904782e0011ef1744fe", 0x74, 0x14f6885f}, {&(0x7f0000000100)="70e28fccb77f73860247a804c1a2f22d83eca67e8f6e10bc816cc1d953b2f98bb089979446fcd4b9196c6afc87b8", 0x2e, 0x2}, {&(0x7f0000000300)="c46377a63fcbf1dce3024b3e62e4172bcf0329d78bbc74e0cab529a8bac72a530361ef03fe85a71d513438f52c7179c664c737022295b27d1596ff390ba6a4c51024cc9094401c830c5e4ebb9c45e4eb5e9ece7e7e5a265965041ad93144bdfa8f30bf071dd01a1e70ce9ef2784763ef8b49333fdeb98af69eb889e2ba686910ba7666d3e4ef07c4d3242818ed5ed69572b2958aa78462686b8187", 0x9b, 0x4}, {&(0x7f00000003c0)="78f788576f63125131586c8bc3", 0xd, 0x3}, {&(0x7f0000000400)="e3154054a0752ce136cdc3d5fc489135e3c30afe2b00adf92636b89120c957d0a1ba3fb604204c612c24e5b589f56dd48df3473a91084685c884512cfb", 0x3d, 0xc3d}, {&(0x7f0000000440)="902af1f5ad45210867d0f4d4f66c68b2b36f9f024e8a1be8b7564f290aff2c247d2eb62ef6dd9b19bbab26ce28b2663c7adfcf4c5af397c2de0056f6702101bea42c0afef7713eddb43b3ace812a6594db54e9781ba3f469979c3a2a9d98be952e594901e41a8ef729b805ca638ada31c2c5a49c14d3b965968b5e2725ad12a8a1e2308496f15fb903198da6c62bd2b4c4f7edb1e81302", 0x97, 0x5}, {&(0x7f0000000500)="ae299d4fe2f01fc83241810dce2051f6bca62708828018903d175489e973f7eca0a8bb8d9ad69114d07230da176b48b28ce6aac29c225a905258527d9d9c9a1b296fccdc820a7bcff1c26b25aba941256a02ef9c36d352b0cdab3ab3e4bd00380ab418ce054857874cd0d0f784dc0266a2984ec176fc99aba3c8d16c4823d4075b7ff6b1ff4738de5a012a290914577be2bcf134ae2ab4f824441d7c4e19fcab9f0dba0a4edf08db5f599c32b3508121ab9852eb29deb810dea8da3cf4e24793c25e9676194cefc2e3bf5a74803d76dcfba3ad5a284c2bbba54a6b0982bbf30c44a25c16c8058b18d23e0cb3dc92601bda84216847f8bc9813", 0xf9}, {&(0x7f0000000600)="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", 0xff, 0x80}, {&(0x7f0000000700)="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", 0x1000, 0x1000}], 0x10000, &(0x7f0000001800)={[{@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x2}}, {@noacl='noacl'}], [{@audit='audit'}, {@fsname={'fsname', 0x3d, ')mime_typevboxnet1\xadGPL('}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) flistxattr(r1, &(0x7f0000000000)=""/23, 0x17) r2 = msgget(0x1, 0x100) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000001880)=""/85) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff9) 08:12:50 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x7000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2887.147461] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:50 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xe000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xa49db6b7}, 0x1c) 08:12:50 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8060000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:50 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2887.245152] erofs: read_super, device -> /dev/loop5 [ 2887.250217] erofs: options -> acl,fault_injection=0x0000000000000002,noacl,audit,fsname=)mime_typevboxnet1­GPL(,fsmagic=0x0000000000000005, [ 2887.335159] erofs: cannot find valid erofs superblock 08:12:50 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:50 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2887.377388] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:50 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x14000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x4002000000000000}, 0x1c) 08:12:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2887.676012] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2887.890761] erofs: read_super, device -> /dev/loop5 [ 2887.902588] erofs: options -> acl,fault_injection=0x0000000000000002,noacl,audit,fsname=)mime_typevboxnet1­GPL(,fsmagic=0x0000000000000005, [ 2887.916532] erofs: cannot find valid erofs superblock 08:12:51 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x80000000, 0x8, 0x4, 0xc56a, r1}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x779, 0x10001, 0x5, 'queue0\x00', 0x3}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:51 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x88470000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:51 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x300000000000000}, 0x1c) 08:12:51 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1c, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:51 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:51 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x5, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2888.096900] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:51 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:51 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x200000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:51 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x20000}, 0x1c) [ 2888.256275] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:51 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:52 executing program 5: socketpair(0x10000017, 0x0, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x6, 0xdeac}, &(0x7f0000000080)=0x90) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000340)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)={r2, 0x3, 0x9}, 0x8) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x3) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000240)={0x0, 0x0, @pic={0xffffffff, 0x1f, 0x1f, 0x401, 0x0, 0xa918, 0x9, 0x0, 0x6, 0x5, 0x5d, 0xff, 0xffff, 0x2, 0x4, 0x9e}}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x4, 0x4) 08:12:52 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfc00000000000000}, 0x1c) 08:12:52 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x4788, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:52 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:52 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xe0000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:52 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2888.773657] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:52 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x2000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xa00}, 0x1c) 08:12:52 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:52 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:52 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x40000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2888.980469] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:52 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x60, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:52 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:52 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x9000000}, 0x1c) 08:12:52 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[], 0xfffffe60) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r2 = getpid() write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0x0, 0x3, {{0xfffffffffffffffc, 0x6, 0x3, r2}}}, 0x28) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:52 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x1c, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:52 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x1c00, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2889.355270] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:52 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:52 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xe00}, 0x1c) 08:12:52 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x689, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:52 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:53 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x700, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2889.541042] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:53 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:53 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x86ddffff00000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x4800000000000000}, 0x1c) 08:12:53 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:53 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xd, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:53 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x81000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2889.796126] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x4000000000000000}, 0x1c) 08:12:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:53 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2890.016032] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:53 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) accept4(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f0000000080)=0x80, 0x80000) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:53 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xf0ffff, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:53 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:53 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4788, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x54000000}, 0x1c) 08:12:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2890.414308] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:53 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x7000000}, 0x1c) 08:12:53 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x3000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:53 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2890.628142] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:54 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x88480000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:54 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:54 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:54 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xff00000000000000}, 0x1c) 08:12:54 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x89060000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2891.024915] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:54 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:54 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x5, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:54 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x600}, 0x1c) [ 2891.198970] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:54 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x1, 0xb3, 0x80000001, 0x5}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r2, 0xff, 0x80000000, 0x8, 0x2000000000, 0x391}, 0x14) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) fcntl$getown(r1, 0x9) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4800, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0xfff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x9, 0x4, 0x2, 0x87f5, 0x401, 0x8f51, 0x6, 0x10001, r4}, &(0x7f0000000180)=0x20) getsockopt$inet6_dccp_int(r3, 0x21, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) io_setup(0xffffffffffff0001, &(0x7f0000000300)=0x0) io_cancel(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0xfffffffffffffbff, r1, &(0x7f0000000340)="ee3930b1ad256ae63b07e5646e175de7b10e4aa528201532b9c69032fd2ae2f649f55dbddde4d69689d5a1c27085d7a07268a2a13c619f57d40359a3ce433296901c95e8d3fb1962b8a19f7e482b3eff6e614c304245b100023a3d823519ef6bb911ef", 0x63, 0x7, 0x0, 0x0, r3}, &(0x7f0000000400)) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:54 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x300000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:54 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x3f000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:54 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2891.352660] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xcbacb0ef00000000}, 0x1c) 08:12:54 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffffdd86, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:54 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:54 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x20000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:54 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64EXEC\x00', &(0x7f0000000040)='\x00', 0x1, 0x2) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:55 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xf0ffffffffffff, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x8dffffff}, 0x1c) [ 2891.643210] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:55 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:55 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8848, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:55 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8847000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x300}, 0x1c) 08:12:55 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2891.896343] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:55 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xd00, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:55 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3f00, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xf0ffffff7f0000}, 0x1c) 08:12:55 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000700)='./file0/file0\x00', 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/member\x00', 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x80000000032, 0x4) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\x80', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000003c0)=ANY=[@ANYBLOB="696e6f00005f7265616461686561645f626c6b733d307830c207000000000000303030303030302c00ceb7836976c385da03e77bf80c768f82197c32fb16349dfb26515872921c4f7fa55af01de7543b9d164aa4420cf85b87f63c312cc3c4bc5eb25a687facb590869b88035b98831276bd87ea42d6bd6b27e854ee7d25e08d989c9f62a281ce6c151b72ed3d5e26505557a7434ba218767755f40860a5ae06fc59a71ecffea93faee7b2d8917d255e42838f09a369441fd5b3e5779ceea2946a9bec65aac4173d20862a850f58d4a1cce8564075aa63a8577fd42b8be6e5b10a7c2395b2d9190759dd32bb488d963128f8"]) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000a00)=0x0) write$P9_RGETLOCK(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="320000003702000107000000008c3b0007000000000000008992ff24c75a29e83d7c96a40c3c884da9025d8b911d2fa6ceeba6f113b9eb401f6a3b32444982cbea1df85dd068c7e08ab19c29ee432b771c542af351e6c650aac2dc35887949e8593ef70d4a4dd5011084d0963e75eb0f2daeb3a7bd9588a963ecf14a3e6676d87540843df9ac21f11adee9d4b763e0cd31410e965dbba769703470b780467369d494a44c3cc080408f2fa663c9ab946ae05a66", @ANYRES32=r5, @ANYBLOB="1400696e6f64655f726561646168656164636c6b7300"], 0x32) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000740)={{0x4, @loopback, 0x0, 0x2, 'lblcr\x00', 0x8, 0x7, 0x32}, {@multicast2, 0x4e24, 0x2007, 0x4ae8, 0x400, 0x8}}, 0x44) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000980), &(0x7f00000009c0)=0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)=""/165, 0xa5}], 0x1, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000880)=""/237) ioctl$BLKALIGNOFF(r4, 0x127a, &(0x7f00000006c0)) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0x12b) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 08:12:55 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x6488, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:55 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:55 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4888, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x5400000000000000}, 0x1c) [ 2892.417188] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:55 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x3000000}, 0x1c) 08:12:55 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:55 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8100000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2892.531584] IPVS: set_ctl: invalid protocol: 4 127.0.0.1:0 08:12:56 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x600, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2892.616749] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2893.252295] EXT4-fs (sda1): Unrecognized mount option "ino" or missing value [ 2893.255475] IPVS: set_ctl: invalid protocol: 4 127.0.0.1:0 08:12:56 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:56 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:56 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x608, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:56 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x7}, 0x1c) 08:12:56 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88a8ffff, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:56 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:56 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2893.505789] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:57 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8060000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:57 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x89060000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfec0000000000000}, 0x1c) 08:12:57 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2893.696442] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2893.725588] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:57 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xf0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:57 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:57 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x2, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xf4010000}, 0x1c) 08:12:57 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) syz_open_dev$admmidi(&(0x7f0000002700)='/dev/admmidi#\x00', 0x9, 0x80000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000000)=""/93, &(0x7f0000000080)=0x5d) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0x4080) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x40000000d) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:57 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2894.582749] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:58 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x6000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x3f00}, 0x1c) 08:12:58 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:58 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffffa888, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:58 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x54}, 0x1c) [ 2894.794257] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:58 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:58 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x500, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:58 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2894.855020] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:58 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2895.014796] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:58 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x4000000}, 0x1c) 08:12:58 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:58 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8848000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:58 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8847000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:58 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:58 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x3f00000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x1000000}, 0x1c) [ 2895.302303] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:58 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x43050000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:58 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:58 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:58 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x5000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2895.499469] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:59 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/45) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:12:59 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:59 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:12:59 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xf0ffff, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:59 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfec00000}, 0x1c) 08:12:59 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x600, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:59 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2895.898257] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:12:59 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xf5ffffff00000000}, 0x1c) 08:12:59 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x800e000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:59 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:12:59 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8848, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:12:59 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2896.138929] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:00 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfe80000000000000}, 0x1c) 08:13:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:00 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x4000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:00 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'team_slave_0\x00', r2}) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:00 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8035, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2896.649117] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:00 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x1400, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:00 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfffffff5}, 0x1c) 08:13:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:00 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:00 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x3f00, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:00 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2896.859647] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:00 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3580, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xffffff91}, 0x1c) 08:13:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2897.104760] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:00 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) getcwd(&(0x7f0000000180)=""/4096, 0x1000) prctl$PR_SET_SECUREBITS(0x1c, 0x10) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:00 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xffffca88, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x8}, 0x1c) 08:13:00 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:00 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x7000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:00 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xd, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2897.502026] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:01 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x2000000000000}, 0x1c) 08:13:01 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1400000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:01 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:01 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x806000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2897.751727] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:01 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xf0ffffffffffff, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:01 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xe000000}, 0x1c) 08:13:01 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xd00000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:01 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000000)={0x800100d, 0x7f, 0x3}) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:01 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:01 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2897.990374] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:01 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x4305000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x700000000000000}, 0x1c) 08:13:01 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1c00000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:01 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:01 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x14000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:01 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:01 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4000000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2898.194851] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x900000000000000}, 0x1c) 08:13:01 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2898.375724] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:02 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x6, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:02 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x6000000}, 0x1c) 08:13:02 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x81000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:02 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000", 0x11) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2898.640236] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:02 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x200000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:02 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x600000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x8000000}, 0x1c) 08:13:02 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2898.795513] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:02 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x300000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x26bd110883020000}, 0x1c) [ 2898.899314] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:02 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2899.052075] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:02 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000180)="0a5a3a71c2e196081d96801ebc12eda84313c88b6e41ceb4f8c6c1480744bfad2caaee73d60f4e2d1c85c87421332e2b8c4472a06c1ee6c08bb87e400fd133f105c85d0017af46b2cfc534ae572ea79bc5168891f0a34351f434c5d203a9955c906bc2bd731db28f3f18a8865acc5e5b8aaf4e649dbc3a9b18c6964d021fed505b746e35d56180c056f0e63670a7d5ef944d90886b87d0b30edb6a384b7f2216fee25f4e0b6e0197210e5481ae5d0b42bd", 0xb1, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000240)='.\x00', 0xfffffffffffffffc) request_key(0x0, 0x0, 0x0, r2) 08:13:02 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x600000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:02 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x8100, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x100000000000000}, 0x1c) 08:13:02 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:02 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x7, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2899.344506] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:02 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x500000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xa000000}, 0x1c) 08:13:02 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:02 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x88caffff00000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2899.507823] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2899.574198] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x4000}, 0x1c) 08:13:03 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:03 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:03 executing program 5: socketpair(0x0, 0x3, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x204000, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) inotify_add_watch(r2, &(0x7f0000000100)='./file0\x00', 0x200) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) lseek(r1, 0x0, 0x1) 08:13:03 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xfffff000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2900.016503] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:03 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:03 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8864000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:03 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xd000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x5}, 0x1c) [ 2900.123127] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:03 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8906, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:03 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:03 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x2000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2900.282327] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xcbacb0ef}, 0x1c) 08:13:04 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[], 0xfffffffffffffe33) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000180)="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", 0xfd, 0x7fbf}], 0x10000, &(0x7f0000000280)={[{@jdev={'jdev', 0x3d, './file0'}}, {@nouser_xattr='nouser_xattr'}, {@replayonly='replayonly'}, {@resize={'resize', 0x3d, 0x1ff}}, {@balloc_border='block-allocator=border'}, {@errors_continue='errors=continue'}], [{@func={'func', 0x3d, 'PATH_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'memory.events\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_measure='dont_measure'}]}) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:04 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:04 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x800000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:04 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xe8030000}, 0x1c) 08:13:04 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x700000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:04 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xffffffff00000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:04 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2900.725440] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x2000000}, 0x1c) 08:13:04 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x806, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:04 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:04 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2900.928047] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2900.944282] REISERFS warning (device loop5): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2900.944282] [ 2901.518047] REISERFS warning (device loop5): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 2901.518047] 08:13:05 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfc}, 0x1c) 08:13:05 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xf000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:05 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:05 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:05 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2901.664887] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x2}, 0x1c) 08:13:05 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:05 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88caffff00000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:05 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:05 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x800e, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x8dffffff00000000}, 0x1c) 08:13:05 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) accept4$alg(r1, 0x0, 0x0, 0x80000) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:05 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:05 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:05 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xf000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:05 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x4, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xa}, 0x1c) 08:13:05 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xe0, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:05 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2902.405219] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:05 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x3f00000000000000}, 0x1c) 08:13:05 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:06 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xe000000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2902.656585] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:06 executing program 5: socketpair(0x1f, 0xe, 0x2000000000000000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x4, {0x401, 0xfff, 0x4, 0xde8}}) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:06 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xf5ffffff}, 0x1c) 08:13:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:06 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xd00000000000000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:06 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8035000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2902.968581] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:06 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:06 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88470000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:06 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x88a8ffff, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x18020000}, 0x1c) [ 2903.135776] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x80fe}, 0x1c) 08:13:06 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x8) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:06 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x4305, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:06 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:06 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c) [ 2903.567710] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xa49db8b2}, 0x1c) 08:13:07 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x7, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:07 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:07 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:07 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0xfffffffffffff000, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x600000000000000}, 0x1c) [ 2903.773765] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2903.797316] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:07 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000000)={0x9, 0xfffffffffffffffe}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='memory.events\x00') ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:07 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:07 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:07 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x12, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:07 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xb7b69da4}, 0x1c) 08:13:07 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2904.134274] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:07 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x40000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:07 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x14, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x1802}, 0x1c) 08:13:07 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:07 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0xd961, 0xd, 0x1, "e7e52db94e7b46b627bfb7909f26fc78e0fe1c7f7a6c90f4205c0fa43f6031d3", 0x47425247}) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:07 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:07 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x300, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2904.514086] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:08 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8864, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:08 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:08 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x5000}, 0x1c) 08:13:08 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:08 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x16, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:08 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x608, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2904.711994] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:08 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:08 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:08 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x4, 0x0, @multicast1}}}}}, 0x0) [ 2904.911509] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:08 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket(0x8, 0x4, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f00000001c0)=0x7) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x6, 0x400000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) r4 = semget(0x3, 0x5, 0x50) semop(r4, &(0x7f0000000040)=[{0x3, 0x3, 0x1000}], 0x1) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f0000000080)) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x8002, 0x0) 08:13:08 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x3e8}, 0x1c) 08:13:08 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x100000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:08 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:08 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:08 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xffffffff00000000, 0x0, @multicast1}}}}}, 0x0) [ 2905.242777] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:08 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x800e, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:08 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x4000, 0x0, @multicast1}}}}}, 0x0) 08:13:08 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x1802000000000000}, 0x1c) 08:13:08 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:08 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:08 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x543, 0x0, @multicast1}}}}}, 0x0) [ 2905.446344] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xff0f000000000000}, 0x1c) 08:13:09 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:09 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:09 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0xffffffffffef7fdc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ftruncate(r1, 0x3) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x2) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x7f, 0x7}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r2, 0x7, 0x2, [0x3ff, 0x1000]}, 0xc) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:09 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x800e000000000000, 0x0, @multicast1}}}}}, 0x0) [ 2905.674620] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:09 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3f00000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xffffffff00000000}, 0x1c) 08:13:09 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:09 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xe000000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:09 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8100, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2905.886569] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:09 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x89060000, 0x0, @multicast1}}}}}, 0x0) 08:13:09 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x218}, 0x1c) 08:13:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:09 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/202, 0xca}, {}], 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:09 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xd00, 0x0, @multicast1}}}}}, 0x0) 08:13:09 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8100000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2906.146300] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:09 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfec0}, 0x1c) 08:13:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:09 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x806, 0x0, @multicast1}}}}}, 0x0) 08:13:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xff00}, 0x1c) 08:13:09 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1400, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2906.346261] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:09 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x3}, 0x1c) [ 2906.574715] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:10 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) write$P9_RREAD(r0, &(0x7f0000000180)={0x106, 0x75, 0x1, {0xfb, "a8e1346fb6f51e1d0dc65aeebed10cf813a18de9814653ecd8d3a38f1e0aafc0c348625ad2d840e7215878f0455af82502d6e934296e7c48e09efd4d314f03ac02fa5183ea2cd2175e226167cab1330686790c1467e7e77fb73b12dd6ce46d8aa3d5e5714ebbc72205babf9630375a4c54a7944372bb75c48e7f8af8801c6358dd96c5a9455c11684807545a355468fa6089fa7c1f8e0e71140a9023c2c7997f887b7b6c67f7e01bb91dc198f2e1e07d873d86123d1f78d84e43ccdb2070f79dcc615e7672b8cb6309bba865768c2bff152b285ed0398949b4a3fed57cadbbac27754cad60d7f03ac9fa1fab32d7171245972b90023c1146e38b1b"}}, 0x106) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:10 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:10 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xe80, 0x0, @multicast1}}}}}, 0x0) 08:13:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:10 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x1f4}, 0x1c) [ 2906.920478] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:10 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x88480000, 0x0, @multicast1}}}}}, 0x0) 08:13:10 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6488, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x50000}, 0x1c) 08:13:10 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2907.054083] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:10 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xf0ffffffffffff, 0x0, @multicast1}}}}}, 0x0) 08:13:11 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:11 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:11 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88480000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x48000000}, 0x1c) 08:13:11 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x6000000, 0x0, @multicast1}}}}}, 0x0) [ 2907.634237] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:11 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xf000, 0x0, @multicast1}}}}}, 0x0) 08:13:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:11 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8847, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) 08:13:11 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:11 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8864, 0x0, @multicast1}}}}}, 0x0) [ 2907.833004] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:11 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) request_key(0x0, 0x0, 0x0, r2) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000040)) 08:13:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:11 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:11 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xe000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xfe800000}, 0x1c) 08:13:11 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x88a8ffff00000000, 0x0, @multicast1}}}}}, 0x0) [ 2908.254067] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:11 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xffffca88, 0x0, @multicast1}}}}}, 0x0) 08:13:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0xff0f0000}, 0x1c) 08:13:11 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2908.305922] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:11 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xe80, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:11 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000080)=0x10000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 2908.458616] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:11 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:11 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x700000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:12 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xd00000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x900}, 0x1c) 08:13:12 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x800e000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2908.684585] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:12 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:12 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x200000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x17) 08:13:12 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x60000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2908.866236] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2908.922950] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:12 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={0x0, 0x91}, 0xfffffffffffffffd) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000240)={0xf7, 0x1, 0x2, 0xffffffff, r1}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) request_key(0x0, 0x0, 0x0, r3) 08:13:12 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x2000011c) 08:13:12 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x3f000000, 0x0, @multicast1}}}}}, 0x0) 08:13:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:12 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x806000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:12 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x5000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2909.258545] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:12 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x26041, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000140)="db125a16b11d087bb96a4d0c6d865a7ca12480ef4574a2b2f0672b6b269f1acacdd29723bffd263edd72fb21f6540dd219a492623f40a76465d4c921dc131b243e5896e6ff4f3e33af5fb2e020c83235aa803df8dbc9f5a62e669ac7f5aa631fc51eb36b3703350c9f46bcc5a0362f41f6e435e7433af086d1ba88d52efd6782a38bcc68248b07890e621a7959e902675801db1b7bbdc7de3c543e548e466a6e5e99c2cd660bfa3e9361636dbcee4c1b6812570ac727c875ddbcc05ab4e7", 0xbe, 0x800, &(0x7f0000000200)={0x11, 0xc, r2, 0x1, 0x4800000, 0x6, @broadcast}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:12 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8060000, 0x0, @multicast1}}}}}, 0x0) 08:13:12 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x14, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2909.474446] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:13 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:13 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xd, 0x0, @multicast1}}}}}, 0x0) 08:13:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) r1 = dup2(r0, r0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000000c0)=0xe8) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000000)='./file0\x00', r2, r3, 0x400) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:13 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:13 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:13 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6000000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2909.941538] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:13 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8035, 0x0, @multicast1}}}}}, 0x0) 08:13:13 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xd000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:13 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x200, 0x240) ioctl$TIOCGPTPEER(r1, 0x5441, 0x6) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000140)=""/234) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:13 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:13 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:13 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2910.185763] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:13 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:13 executing program 3: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'bond_slave_1\x00', 0x0}) sendmsg(r0, &(0x7f0000001a40)={&(0x7f00000003c0)=@xdp={0x2c, 0x3, r1, 0x32}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000440)="59ab1baf0640d4ce2ab703ad9a1a657c75e3a5e9ff78b33b9aa898dd70246a1c77b77b42c2f5c1f69fe5e5bc205fc7b1c56bf069e8fdf16374fa7901eed641d171fc444677ad1ba026c61918175dfda3c336bd5f2dae54fd34258a896950e7aa32c9353c0ff81e40c7b3d3ab2ebe4ef5c4025dbed77f41cb4bdfcd1c0b4b0b", 0x7f}, {&(0x7f00000004c0)="b825d9b7df2a67a2531033b06839682fb4ce300669bff49d0119034028b3eb8cd2a0956999d70d9a16fc596cc5983420679dc1df48781dfbaf51de0a127890166d2e990125f5b06ab25160c71313fda23900d596966c4f4d1991124aa8c90d4f9715ed0bd5c8e91952a33b90c4bd612f00860f6df620e8fd99febf1e2b0ecaebcb7e236d067cf33cf3d00398af12c001108184cf62b0e245db420530", 0x9c}, {&(0x7f0000000580)="b4175548b258d304ccdd435eae1d46e66d5da9a95cbdb6a10304aadbd3cafeb4fa788fafa5c39299a33b6fe523be840c62831500ff834a9e8e48bda4e3c6222ecbbfccc14728ade6378de28b456b6368faa872904d4cac8631223144f08bb500be41f0203aecfdba97fb362f6255d309e31196e29a119412e1abc87ee43d925bba820f23a3a78e621944671a4e84d57eadb4ae58c1fae628be28b19978ce4d87cef5c03343066868a1ff8f732add63829522c0df9d38e605b504006a3646bf275e492d41d9e04f777b7198", 0xcb}, {&(0x7f0000000680)="4ae662bc46d5b1f9a35d9cdda23b9328be39678a2f10dbc26459889b9373a1fc8f5f308b535b5bd0f1394d9cace17b2afb88609884d30f076a0b9745cbd41d2047802637d51da31417a906e3ee17d59baa937c149f35a2a5a086d2ef8bb22aa08e8b55abea753544f1b2510242bcb9a3173027118956d5cead02a23ce3d8095f3c05d4b4bf447483c2567f14fe07f562e31ae33c6a685144eb916bee42900ba25021f1272aed119e60f73399ea0d7034c6d04e298844fe3b385a2cfac2267b8700c8181ab0be77a1dcb4eda2aeb702f9b69fb4e9c3a67702c29afc69566fe76d924fe58dcc3f740f514836bd0a", 0xed}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="017e597affa8f534ef23840a2a812a972a516d7b67dff6fc1bd39deacfe7ba4cbd0a0702178d9a47fa2004b1f9c48c76c9809ed5b6d934759ad3cf99823837c8a411426a76f4f764fdd50f8ede32b0ab0b97008da1260661bfba6ee68d1a204c9d3b402e763647a46d4a730b8d3b21d6d10c4ea7cd639e7a2daba705e6465fe85c6c588d227eb17c39c82a9beac64361b65ed931c75665fe97e4f9", 0x9b}], 0x6, &(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x158}, 0x800) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) 08:13:13 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:13 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffffffff00000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:13 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb4, r1, 0x120, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x31c1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x8000}, 0x4040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000040)={0x7f, 0x1, 0x8, 0x5, 0x61f}, 0xc) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000080)='syz0\x00') write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[], 0xfffffffffffffe08) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x101000, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000100)=0x7, 0x4) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:13 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x6000, 0x0, @multicast1}}}}}, 0x0) 08:13:14 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3fe7c9f8) getcwd(&(0x7f0000000080)=""/75, 0x4b) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) bind$inet6(r0, &(0x7f0000000180)={0xa, 0xfffffffffffffffc, 0x0, @local, 0xfffffffffffffffd}, 0x1c) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x44e22}, 0x1c) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r2 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x679c, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1}) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e1f, 0x0, @mcast2}, 0x1c) [ 2910.554765] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:14 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:14 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8864000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:14 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x800e0000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2910.670784] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:14 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:14 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:14 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:14 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8848000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x100, 0x0) getsockname$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) 08:13:14 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x80350000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2910.914053] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:14 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:14 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:14 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x300, 0x0, @multicast1}}}}}, 0x0) 08:13:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1cc) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:14 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:14 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88640000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2911.133633] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:14 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x408000, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'bcsf0\x00', 0x600}) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cgr\x02up.events\x00\xaa\x03\xe2%K\xe9@2\xccg\f%oF\xd9\xe8\x92|\x1b\x0f:\xaa\x88\xb4\\,\\\xda\xf1\xbe\xb0#\xea`\n\xc2:_\xf3\x00\xe9\xebZ}3\x15Hy|\x99\x91\x18\x94\xa8\x0eE\x84\x00\xb3&\x97L\xff\x1e\xc3\xe8*\x9c\xc3\x8f\xf6\x8b\x93\xefe\x06\x92\xdf\xba\x17\xed\xcc\xb4\x8b\x94\x01\xa8\xc1u\x8bA\xd5\x85+\x1d\xd3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES16], @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRES64=r0, @ANYRESOCT=r2, @ANYRESDEC=r0, @ANYRES32=r0], @ANYRESOCT=r2, @ANYRES64=r2, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="7ce0c124d99e503191dfae4ee834beebf34c7f16a2fe9f32c335f4f73bbb4746038b544e146fcd69a79d32f40ebbea6da531b955e354464f33c123caca175746b177e8bf2a67836ec9c7c15d1e8f73a0cceebf77edb73d43e0a82097132c616b4cabddfa62198c9d0c181c560a3f8d77b35162121efe14e5df93a17cd1956379cf70eeea97e61fc4e48f2a6c04998c18c97e67f4f4213ba9ec8235bc8d2aa055cfb5fd9a40000000c61454225e3bb19612881fad247d39a14457474ddb1ab7c992", @ANYRESHEX=r2, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRES16, @ANYRES16=r2, @ANYRES32=r0, @ANYPTR64, @ANYRESOCT=r1, @ANYRESHEX=r2, @ANYRESOCT=r2], @ANYRES32=r2]], 0x1c) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) getpgid(r3) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x5000005) request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='bcsf0\x00', 0x0) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000580)='$', 0xfffffffffffffff8) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000080)=0xffffffff, 0x4) 08:13:14 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x86ddffff, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:14 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x800) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @reserved}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) write$UHID_CREATE(r1, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000140)=""/132, 0x84, 0xffffffffffffff75, 0x200323b4, 0x100000001, 0x4, 0x100000000}, 0x120) bind$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) sendto$inet6(r1, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f00000004c0)) 08:13:14 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x6488, 0x0, @multicast1}}}}}, 0x0) 08:13:14 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:14 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) getresgid(&(0x7f0000000300), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000000)=')em0GPL\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2008000, &(0x7f00000004c0)={'trans=xen,', {[{@aname={'aname'}}, {@noextend='noextend'}, {@noextend='noextend'}, {@dfltuid={'dfltuid', 0x3d, r1}}, {@access_client='access=client'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_uid={'access', 0x3d, r4}}, {@cache_mmap='cache=mmap'}, {@aname={'aname', 0x3d, '\'self^'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '{/'}}, {@hash='hash'}, {@dont_hash='dont_hash'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}]}}) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000600)) [ 2911.628843] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:15 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x88caffff, 0x0, @multicast1}}}}}, 0x0) 08:13:15 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xfffffffffffff000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:15 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:15 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000001c0)={r2, 0x3, 0x7, 0x4}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:15 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x800, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x3e) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000100)={0x3251caf292150a42, 0x103, 0x3, {0x1, 0x400, 0x6, 0xff}}) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:15 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2911.869129] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:15 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x800e0000, 0x0, @multicast1}}}}}, 0x0) 08:13:15 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x543, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:15 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:15 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x8001, 0x4, [0x7, 0x6, 0x6, 0x10001]}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r1, 0x1000, 0x1, [0x0]}, 0xa) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0x0) readv(r0, &(0x7f0000002300)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000002180)=""/33, 0x21}, {&(0x7f00000021c0)=""/176, 0xb0}, {&(0x7f0000002280)=""/101, 0x65}], 0x6) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) listen(r0, 0x3) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:15 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2912.076082] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:15 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:15 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x40000000, 0x0, @multicast1}}}}}, 0x0) 08:13:15 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:15 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000000)={0x3, &(0x7f0000000180)=[{}, {}, {}]}) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0xfffffffffffffffd, @thr={&(0x7f0000000200), 0x0}}, &(0x7f00000002c0)) readv(0xffffffffffffffff, &(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fanotify_init(0x0, 0x0) readv(r1, &(0x7f0000004740)=[{&(0x7f0000000500)=""/149, 0x95}], 0x1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r2, r1, 0x0) r3 = gettid() shutdown(r1, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) setsockopt$sock_int(r0, 0x1, 0x3a, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:15 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x88caffff00000000, 0x0, @multicast1}}}}}, 0x0) 08:13:15 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffffca88, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2912.279059] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2912.310557] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:15 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:15 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:15 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x689, 0x0, @multicast1}}}}}, 0x0) 08:13:15 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xe0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:16 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2912.575566] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:16 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x800e, 0x0, @multicast1}}}}}, 0x0) [ 2912.634814] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:16 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:16 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2912.838232] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:16 executing program 5: socketpair(0x0, 0x0, 0x80000001, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r1, 0xb}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="48eb1b000b5feb1f9e183e569654de1dd1ecf5a6cb0405fd50b31eecf5f80f0865b106e6d54b06f7c447da8a836a7679046d92", @ANYRES16=r4, @ANYBLOB="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"], 0x248}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000600)={0x0, 0x5, 0x9, [0x8000, 0x8, 0x2, 0xfffffffffffffff9, 0xffff, 0x2300, 0x6, 0x5422, 0x7f]}, &(0x7f0000000640)=0x1a) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000680)={r5, @in={{0x2, 0x4e21, @remote}}, 0x6, 0x3, 0xfffffffffffffffa, 0x3, 0x81}, &(0x7f0000000740)=0x98) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_VOICE(r6, 0x112, 0xb, &(0x7f00000000c0)=0xf4, &(0x7f00000005c0)=0x2) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:18 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:18 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88caffff, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:18 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xd000000, 0x0, @multicast1}}}}}, 0x0) 08:13:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='comm\x00') ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000180)=0x400) epoll_create(0x5) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000240)={0x2, 0x5}, 0x2) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x4, @empty, 0x7}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{0x100, 0x100, 0x0, 0xd1}, {0x4, 0x3, 0x6, 0x3}, {0x20, 0x100, 0x4, 0x5}, {0xfffffffffffffffe, 0x3c3, 0x4, 0x7}, {0x7f, 0x282dae6f, 0x9, 0x9}, {0x7, 0x7, 0x0, 0x1}, {0xf365, 0x5, 0x3, 0x13d1}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x8800) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:18 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000180)={0x6, 0xf2}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYRES64=0x0], 0xc) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2d, 'cpu'}, {0x2b, 'pids'}, {0x2f, 'memory'}, {0x2d, 'io'}]}, 0x17) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x3) fsync(r1) [ 2915.373549] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:18 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:18 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xd00, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:18 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x5000000, 0x0, @multicast1}}}}}, 0x0) [ 2915.416176] audit: type=1326 audit(1545120798.822:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17243 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x0 08:13:18 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2915.488024] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:19 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x300000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:19 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:19 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x700, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2915.654173] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:19 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x2000000, 0x0, @multicast1}}}}}, 0x0) 08:13:19 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:19 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3f000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:19 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000, 0x0) fgetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.impure\x00', &(0x7f0000000180)=""/4096, 0x1000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xf) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20, 0xfffffffffffffffc, @local, 0x410}, 0x1c) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000180)={0x8f1, 0x1, 0x7, 0x1, 0xd902}, 0xc) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f00000000c0)=0x4) sendto$inet6(r0, 0x0, 0xfffffdd7, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x100, 0x280) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) 08:13:19 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x7, 0x0, @multicast1}}}}}, 0x0) [ 2916.195368] audit: type=1326 audit(1545120799.602:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17243 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x0 [ 2916.247256] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:19 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1c000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:19 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:19 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8906000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:19 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:19 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000018c0)='/dev/amidi#\x00', 0x9, 0x10900) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001900), 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001680)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000001780)=0xe8) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x9, &(0x7f0000001580)=[{&(0x7f0000000140)="089f983e9b63c94198361176fe0fa8e49747b6bdab0a26d45b9f56fd27efd1a8ecfc4662cc02a423e743f6f054", 0x2d, 0x7fffffff}, {&(0x7f0000000180)="f7992a84b3bc377f18915e332f7a667f24e699efcb1b0f3d701b71137f619c07adfe661d933c45c95ec8525677ebc9018f521b1a09b2698fb164a4a7f5b30b6a12f4219e3cee51d36de6e4bdabcb6f4187ed53865bd5a390722c786600e9ce5ebb2762ba400867a4d95e3c0c093970ddd629c0528141244fdece72947a62a5f5514c12", 0x83, 0x7f}, {&(0x7f0000000380)="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", 0x1000, 0x5}, {&(0x7f0000000240)="7ede1ef2b1edf46d26e8a441defce64cc137391adfb4489e1ced2421835438349246c093899da10f2e0ee636af106ddf31aee43509c0a0b2c0cd4dd6f98512d70e3227783798a2c0a9c6868c6b16e0fe8f1242cd441c0e5f6b7331b2a32ac3fbac74eec63bc3f6e3e24ba4496bc2dcb017c7de01189c22f1559f68125f277bcf5b50c90947615e8d", 0x88, 0x4}, {&(0x7f0000001380)="33186ff9daaadcf9a1572f84d7b4034e6228b3b00b63cc7c39aef33615ee7f5a17481688da769a2de51fa793824bc61f91234a85aa166eb38f48254bc1d6731f1c2165dfb060e0b9f7faf69033201fdc49401e02681761c4c4ad783d028c4ed79fa4e0365242", 0x66, 0x1}, {&(0x7f0000000300)="8f67199fdc22af254e1fb6ff4ded23cb2229c701e463811f66ceb9708d201c656f3362e5399d44844481d5d4a79f411759cf", 0x32, 0x6}, {&(0x7f0000001400)="b9a11949f3ca0653cd4d511373679a38bd9780c27ef1b51b7fa91277e282fd5dee18c7765c11a6eb196a0acf50b58c4106afb96ef71f38dab8a75615c4120e1b442e942ccf", 0x45, 0x1}, {&(0x7f0000001480)="03629bd0ec0089a74b9d4c930727039aeb9dcbf91b4bbf42af40a4cb0fd31ee3660bcd9244e94d05ef54708318f325be7cbb463f72d20e859c171c51f9099153bf63417829fac4579c7240d0b6151897ffb00032e60a3a79ec105d154561c25773baae1f100d20afc7746f68e6f6ad576c6f86eb663af549780196f625547d7b8bcf003d3b70eed653ccd95d", 0x8c, 0xfff}, {&(0x7f0000001540)="e343c8969fa1fff89256dde937c99e2066f864efc4499fdc5413088a419cf96a", 0x20, 0x4ef59f9c}], 0x81, &(0x7f00000017c0)={[{@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@noacl='noacl'}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@noacl='noacl'}, {@user_xattr='user_xattr'}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x77, 0x75, 0x0, 0x0, 0x73, 0x77, 0x32], 0x2d, [0x61, 0x38, 0x63], 0x2d, [0x3d, 0x31, 0x36], 0x2d, [0x77, 0x36, 0x63, 0x33], 0x2d, [0x33, 0x31, 0x33, 0x37, 0x73, 0x37, 0x32, 0x64]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfsroot={'smackfsroot', 0x3d, 'em0}keyringsecurity:,,#{selinux'}}, {@euid_eq={'euid', 0x3d, r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@audit='audit'}]}) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:19 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:19 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xfffff000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:19 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x3580, 0x0, @multicast1}}}}}, 0x0) [ 2916.543001] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x1) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000140)={0xc0000000, 0x7, "cc800d2305b89fca868daf16165e4d6be8aa72713784994f80d79d554dd69d50", 0x2, 0x6, 0xcd0, 0x6, 0x0, 0x8001, 0x5, 0x0, [0xae1, 0x2, 0x6, 0xfffffffffffffff9]}) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:20 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:20 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1c00, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:20 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x4888, 0x0, @multicast1}}}}}, 0x0) 08:13:20 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:20 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000180)="a21b5257ce213b61627c4b0e72502993a7753a32dfa408f0b9e9562e66d549a0817d0e5b6f6978139b9ec06a61f8d680e8ef5e1706b157bf7257b5fe54759bbc6d87cce68d4be19775085fb6cb7f4a46338edb1747e9503c827ec71e94e797708c5fa3e3b62eb9585caf51bf7a96f92b13", 0x71, 0x0) request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='memory.events\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f0000000640)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) add_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)="e35b30149d5c39e28b5de8e6b1cccc7df7ed003d878696cb5cc7613828b8016d05e60b522fa79669776b1d3528bacfaa8d6c8032632cea3790d1dd4c89af467425ce5d97455655c6df9b46758ed5919000e2aa3d087e5392fb8dba588a30146bae768363dfd9eece974c675d84409b5f482fe3e11956fcbb6fbec225171e90e2bd79d2b142f6aeca9877479ae39fd8fb2e5dcde504a639cfff66de995df4915c00182aee3ae0c0ac160e3ffa03d37e7f063589cab63a38944c8a4452551cc3809349df31ebff713c2425608c2bee7d6a0531f830a72858a68005355e65516d93bec373275b32fad695e6bc6b9b9be07ed0bbe73621d87ed53f6e57eb9efa", 0xfe, 0x0) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000006c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8a1f5be728f1fc41}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r3, 0x200, 0x70bd2d, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x20000000) request_key(0x0, 0x0, 0x0, r2) 08:13:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x400) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000200)={0xee, 0xfff, 0xb8, 'queue1\x00', 0xf7}) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, &(0x7f0000000140)) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r1, 0x1) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x7530}}) [ 2916.885878] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:20 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8906000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x69f55dd3, 0x40001) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000140)=0x9) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:20 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x800000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:20 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:20 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:20 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x400000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2917.100709] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:20 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:20 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x43050000, 0x0, @multicast1}}}}}, 0x0) 08:13:20 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4100, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000380)=""/4096) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2917.310329] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:20 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x88640000, 0x0, @multicast1}}}}}, 0x0) 08:13:20 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3f00000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:20 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x24) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000180)=0x8) r2 = socket(0x1d, 0x0, 0x80) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000300), &(0x7f0000000380)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e24, 0xffffffff7fffffff, @local, 0xffffffffffffffff}}}, &(0x7f00000002c0)=0x84) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) fremovexattr(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="60b5b1f2118c0f9d5a7a941bb4901602f8057bc1fe5c54a241cd0b6c498d690996fcc9a0dd0b2d1aa02aed4ed6081ae0edfdab16b2ca1b7f73ce91095d4ad1eb50d8f5341436ccbad85a9eb3f02de6dbaee38b4866c5d0c3b2ce501ff468ddc360f9af58a00edd3da1819e0c0143f56ded13e9c2ad8babb13489e6a3dc5f15085e744c82077f6c226f3c4d8fba1e602b086d80b980c965f692aedc029d4b8193441eb4039e233cf2ee8087d3a142758405458619462d2c4a3449e3abc68491d151de54846c3711716ba1e9cc3f1d1a1aa5d433bb0abb84a79c9494ccb4b55f5a99652ee059e00b00d6afd483b8"]) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x8, 0x1, 0x2, 0x8, 0x0, 0x19dd}, &(0x7f0000000140)=0x20) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20, 0x0, @loopback}, 0xfffffffffffffff5) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:20 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KDDELIO(r0, 0x4b35, 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:20 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2917.574432] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:21 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xe0000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:21 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:21 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8, 0x0, @multicast1}}}}}, 0x0) 08:13:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x101f7c, 0x5, @loopback, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x28) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000004c0)=""/228) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x5, {0x7, 0x1c, 0x95eb, 0x220, 0x0, 0x91, 0x0, 0x6}}, 0x50) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:21 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:21 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2917.806043] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:21 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8848, 0x0, @multicast1}}}}}, 0x0) 08:13:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000000)=0x6, 0x34b) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0xffffffffffffff00) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0xe) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'veth0\x00', {0x2, 0x4e22, @multicast2}}) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2917.992725] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:21 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x440, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:21 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8035, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:21 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x700000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:21 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x600800, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000300)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000380)=r2) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)="126dd74f97503de62c9e48ec2294f317956913e6014363d929639af616996bc6e2f59ee2a114c0df2f26e499be30e62edbca5553808f1921cbfc5983098a470a0a0462cec3aa5e9d56ab23906edca54b7fdb6338db7aa77b4306f9c67ee2254cde71984941a888e46a01486ec58ab2324b665ddc54635ba1b2b63e3504bbdd7646b6dd80a0c921285be6b525e88d44b5c10687fb66620a4e64bc69927c993f8c2a05e69b9b09240f8de6098b49bc2f6f2c56daa34697e6017af3e8be", 0xbc, 0xfffffffffffffff9) r4 = request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='cpuset\x00', 0xffffffffffffffff) keyctl$reject(0x13, r3, 0xb4, 0x7, r4) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2918.289090] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:21 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x200000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:21 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x4305000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:21 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback}, 0xffffffffffffff14) [ 2918.401290] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2918.572427] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2918.614347] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:22 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+', 0xffffffffffffff01}, 0x28, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000000)={0xa, 0x7, 0x8000, 0x60b}, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101a00, 0x0) write$P9_RFLUSH(r1, &(0x7f00000000c0)={0x7, 0x6d, 0x2}, 0x7) 08:13:22 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:22 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x7000000, 0x0, @multicast1}}}}}, 0x0) 08:13:22 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x88480000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2918.953784] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) sendto$inet6(r0, &(0x7f0000000140)="5b089da276a3a9dc7905cd3586b2e95421f10d4d82e65016a2e891f57a05c8691205bea976ef750f2f445c3caa3afdc367965755bb2f56352e6ff7a9949137c7f2b8e03e619d22db21158ce1e0062a31ee3f79784f09991e0373d6cc2e5cb70032a901d3c9d2a6a99c3fb686834337605dcb76f5c7742272c5f0611bf28e6e955dbbf668de7ad073aa14e1753485dc38515bd783b65a97e0463d9ef823a5ce88a9c4b0c1002bb8afc5e5584efe4567e30d6d1e6325ca7a4675a271ad98ab70ccdff22d01b6bb9dccc7e04a359dcca7ffe6de172b6444d6eddf77d5f7943ba2b82b3a320fbf0864204fa57e09359d8a61424fdeae006168", 0xf7, 0x10, &(0x7f0000000000)={0xa, 0x4e21, 0xfff, @dev={0xfe, 0x80, [], 0x20}, 0xd24f}, 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x400000000000007) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000000c0)=0x6, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000440)=0x141) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000380)={@mcast1, 0x2d, r2}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100120}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, r3, 0x10, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x801}, 0x8000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0xa0041, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:22 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x3000000, 0x0, @multicast1}}}}}, 0x0) 08:13:22 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:22 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3580, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2919.111744] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:22 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x500000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:22 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:22 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) fcntl$setlease(r0, 0x400, 0x1) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x2800, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff, 0x2, 0x2, 0x2, 0x100000001}}) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$bt_rfcomm(0x1f, 0x3, 0x3) 08:13:22 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xf0ffff, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:22 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x1000000, 0x0, @multicast1}}}}}, 0x0) [ 2919.625260] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:23 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xffffdd86, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:23 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}, 0x100}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:23 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x500, 0x0, @multicast1}}}}}, 0x0) 08:13:23 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x44e20, 0xff}, 0x1c) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000080)={0x4f, "0d8c55dc36aec5c683657eae51c8db6a52d65ad35d1230dcbe8cc2383b44c922fe8cdddf7857875cf5636d991e6d41101681727fe903ebf038c94c234833595e490a569558657f32e3d70722bd4e89"}) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000180)={r0, 0x0, 0x4, 0xfffffffffffffffa, 0x9}) [ 2919.837528] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:23 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x2, &(0x7f0000000040)=0x4) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:23 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:23 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x600000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:23 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8847, 0x0, @multicast1}}}}}, 0x0) 08:13:23 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20002, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000140)=""/35) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f00000000c0)={0x3, 0x2, 0x9, 0x1f, 'syz0\x00', 0x7fff}) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2920.500959] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:23 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:24 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x300000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}, 0x1}, 0x277) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x2000000000444e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x530, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:24 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x2, 0x0, @multicast1}}}}}, 0x0) [ 2920.680794] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:24 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:24 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040), 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0x4, @local, 0x4}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r1, 0xea}, &(0x7f0000000380)=0x8) r2 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x2000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000400)={'NETMAP\x00'}, &(0x7f0000000440)=0x1e) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) splice(r0, &(0x7f0000000000), r0, &(0x7f00000000c0), 0x0, 0x6) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000180)=0x9, &(0x7f00000001c0)=0x4) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000480)) 08:13:24 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x700000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:24 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xffffdd86, 0x0, @multicast1}}}}}, 0x0) 08:13:24 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:24 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2921.133462] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x4e22, 0x0, @local, 0x3}, 0xffffffeb) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r1 = syz_open_dev$cec(&(0x7f00000006c0)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000700)={@dev, @broadcast}, &(0x7f0000000740)=0x8) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:24 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xfffffffffffff000, 0x0, @multicast1}}}}}, 0x0) 08:13:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:24 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x6000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x1811c0, 0x0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000000c0)) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0xa27}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2921.336882] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:25 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:25 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:25 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x6000000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:25 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0xfffffffffffffff7, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:25 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2921.826862] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:25 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4888, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:25 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xf0, 0x0, @multicast1}}}}}, 0x0) 08:13:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000001, &(0x7f0000000080)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x44e20, 0x0, @empty, 0xffffffff}, 0x1c) sendto$inet6(r0, 0x0, 0x23f, 0x4000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:25 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2922.031161] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:25 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r2 = request_key(&(0x7f0000000300)='id_resolver\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='GPL\x00', 0xfffffffffffffff9) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000280)="12675707af89ac7827d1c6516c52c271ed73c56f99255ef424bcfe0c8d985183fe8b0c3f38cd4c80872f9d664a88f606008a0ea76e736443177bacbc8a647123b23a04e845062d71f52ff724915738e39e", 0x51, r2) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r3 = add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000180)="b4ce8a67479f6808c6367189be0d1fa6bc18ca8cb20a350367d8923834de6a7f3b49bd0d97acf08649ead96998dd5a845efc37b380b0e0a8439911db5524091c95bb2d495ab89d8530cef2d50c4d0e6f8985e103bcd58a66add23e5a258b17a6be53c6383b3f3243fac2ed82e7411b8adda1dda5ccc379574bf1f0da170f819e9065c302ebba6d5bbc3af330720b6d3e0ee71c15042d7cd5c4c9f1f60369ccee22e1136e6a0d40244d99d313d22d7b34f7bd4941433161b6637b9377f458bd6b5003", 0xc2, 0xfffffffffffffffd) request_key(0x0, 0x0, 0x0, r3) 08:13:25 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x4788, 0x0, @multicast1}}}}}, 0x0) 08:13:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = dup2(r0, r0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x4b0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:25 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xe0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:25 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:25 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:25 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xffffa888, 0x0, @multicast1}}}}}, 0x0) 08:13:25 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2922.506413] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2922.534495] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:26 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xf0ffffffffffff, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:26 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) close(r0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x3) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) 08:13:26 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x88470000, 0x0, @multicast1}}}}}, 0x0) [ 2922.689417] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:26 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.usage_in_bytes\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000100)={0x4, &(0x7f0000000080)=[{0x9, 0x2}, {0x6, 0x80000000}, {0x2, 0x8}, {0x5, 0x5}]}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:26 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:26 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x5000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200000, 0x0) setsockopt$inet_dccp_buf(r1, 0x21, 0x80, &(0x7f00000000c0)="311ff967", 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:26 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:26 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x1c, 0x0, @multicast1}}}}}, 0x0) [ 2923.070628] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)={0x1, 0x0, [0x0]}) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000300)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x80, 0x8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000180)={r2, 0xf4, "c1b2ff7e28bac56387ce3834646ef4545c1b5e4f5ca29cbbe55a6ce07b6ae4188a77ef25ab976b3d5723c95cbb7bea302d6980589a520eda8e8edd9188bad425fd7db73fc1c23c6f8d39e371815fae332746504125df0da5a6e846110eb2bc6d04a8aca416c2e55595ebddf0482644524aaf21b4f5b481effa3ab34e2770f3175523587ebdb8837890794aae051bc8d1b2ca21e64588859f9dce35ce9daa48dd74ad4556d958ebae3de3c323a857b3958c97c65baf98344f9b90473b7a7965aa678ad93255ad0acc982871b51b668fb81fefea03bc14dbd029953831c4f7f1e29a7ec889c7f99b703197d7b90b3f5071a4deb3eb"}, &(0x7f0000000280)=0xfc) 08:13:26 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1400000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:26 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:26 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x1c00000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:26 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:26 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x2) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000040)) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 2923.247046] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3fffffffffffffff, &(0x7f0000000040)=0xb52, 0xfffffe95) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)="b3e8a99b33061018a45f524d4c970002fa72c8", 0x13, r1}, 0x68) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @multicast1}, &(0x7f0000000280)=0xc) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000140)={0x0, 0xf72d058, 0x0, 0x1}) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) 08:13:26 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x400000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:26 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x806, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:26 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:26 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:26 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4788, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2923.443626] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:26 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) recvmmsg(r0, &(0x7f0000003a80)=[{{&(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000740)=""/187, 0xbb}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/81, 0x51}, {&(0x7f0000001880)=""/233, 0xe9}, {&(0x7f0000001980)=""/10, 0xa}, {&(0x7f00000019c0)=""/10, 0xa}], 0x6, &(0x7f0000001a80)=""/139, 0x8b}, 0x7}, {{&(0x7f0000001b40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000001bc0)=""/47, 0x2f}, {&(0x7f0000001c00)=""/173, 0xad}, {&(0x7f0000001cc0)=""/4096, 0x1000}], 0x3, &(0x7f0000002d00)=""/175, 0xaf}, 0x7ff}, {{0x0, 0x0, &(0x7f0000002dc0)=[{0x0}], 0x1, &(0x7f0000002e00)=""/250, 0xfa}}, {{&(0x7f0000002f00)=@llc, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002f80)=""/55, 0x37}], 0x1, &(0x7f0000003000)=""/74, 0x4a}, 0x8d94}, {{&(0x7f0000003080)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f00000031c0)=[{&(0x7f0000003100)=""/163, 0xa3}], 0x1, &(0x7f0000003200)=""/138, 0x8a}, 0xffff}, {{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f00000032c0)=""/226, 0xe2}, {&(0x7f00000033c0)=""/9, 0x9}, {&(0x7f0000003400)=""/34, 0x22}, {&(0x7f0000003440)=""/10, 0xa}, {&(0x7f0000003480)=""/233, 0xe9}, {&(0x7f0000003580)=""/96, 0x60}, {&(0x7f0000003600)=""/11, 0xb}, {&(0x7f0000003640)=""/153, 0x99}], 0x8, &(0x7f0000003780)=""/67, 0x43}, 0x9}, {{&(0x7f0000003800)=@nfc_llcp, 0x80, &(0x7f0000003a00)=[{&(0x7f0000003880)=""/236, 0xec}, {&(0x7f0000003980)=""/125, 0x7d}], 0x2, &(0x7f0000003a40)=""/50, 0x32}, 0x100000001}], 0x7, 0x40000000, &(0x7f0000003c40)={0x77359400}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000003c80)={@loopback, r1}, 0x14) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:26 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x3, 0x0, @multicast1}}}}}, 0x0) 08:13:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:27 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:27 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x608, 0x0, @multicast1}}}}}, 0x0) [ 2923.643213] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:27 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) write$vnet(r0, &(0x7f0000000480)={0x1, {&(0x7f00000000c0)=""/42, 0x2a, &(0x7f0000000140)=""/244, 0x1, 0x3}}, 0x68) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000001000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000380)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000003c0)={@loopback, r2}, 0x14) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:27 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8906000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:27 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x600000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:27 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x80000000, 0x10000, 0x4, 0x300, 0x8, 0x7, 0x8, 0x5fc03857, 0x8, 0x8, 0x1}, 0xb) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @rand_addr=0x1}}, 0x1e) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:27 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20, 0x0, @empty, 0xfffffffffffffffd}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:27 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2924.118677] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:27 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xf0ffff, 0x0, @multicast1}}}}}, 0x0) 08:13:27 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8848, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:27 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x800000000000000) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000580)) ioctl$KDMKTONE(r0, 0x4b30, 0x391) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x181c80, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000480)=""/252) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040)=0x10000000800, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f00000005c0)) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000400)={0x4, 0x8, 0xfa00, {r3, 0xffffffff}}, 0x10) recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/17, 0x11}, {&(0x7f00000000c0)=""/25, 0x19}], 0x2, &(0x7f0000000200)=""/232, 0xe8}, 0x12000) 08:13:27 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xd, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:27 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x3f00, 0x0, @multicast1}}}}}, 0x0) [ 2924.355725] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:27 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2924.544702] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:28 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) socket$nl_netfilter(0x10, 0x3, 0xc) 08:13:28 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:28 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x2000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:28 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x1c00, 0x0, @multicast1}}}}}, 0x0) 08:13:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x240000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000140)={0x0, r2}) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2924.874137] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:28 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:28 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x800e, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sysfs$1(0x1, &(0x7f0000000000)='!\x00') 08:13:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:28 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8906, 0x0, @multicast1}}}}}, 0x0) 08:13:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2925.062953] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2925.179025] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:28 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:28 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4000000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:28 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0xffffffffffffffdc, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x8000}, 0x1c) 08:13:28 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x60, 0x0, @multicast1}}}}}, 0x0) 08:13:28 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x40000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x40000000400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e22, 0x8, @loopback, 0x1}}}, 0x84) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x6) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x101000, 0x0) write$cgroup_subtree(r4, &(0x7f0000000380)=ANY=[], 0xfffffe19) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000340)) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000300)={0x20, 0x0, &(0x7f0000000280)=[@increfs={0x40046304, 0x4}, @enter_looper, @register_looper, @clear_death={0x400c630f, 0x3, 0x2}], 0x1d, 0x0, &(0x7f00000002c0)="38b39736007372b225f7f7c7208ff2a3f475c290ef85caa70e8cd0def0"}) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffa) 08:13:28 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2925.548865] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:29 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x806000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:29 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:29 executing program 3: r0 = socket$inet6(0xa, 0x7, 0x40000000000001) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x10000, 0x8080) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001480)=ANY=[@ANYBLOB="050000000000000000d00000000000000010000000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000400000000000000cf00000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00c\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000100000000000004700000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000060000000000000cb00000000000000", @ANYPTR=&(0x7f0000001380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f00000000c0)=""/56, &(0x7f0000000340)=0x38) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000001680)={0xa, 0xfffffffffffffffc, 0x3ff, @mcast2, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:29 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x40000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:29 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:29 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x28, 0x0, 0x3, "1b3f9928c9fc4a2c3eee5e3e7579b67b2fe7633f94a4c1358170353d766934da0febd454fa0d6b9b"}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:29 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x3f00000000000000, 0x0, @multicast1}}}}}, 0x0) [ 2925.785984] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:29 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x86ddffff, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:29 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x4) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) connect$tipc(r1, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x43}, 0x4}}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e23, 0x6, @local, 0x8}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2925.999977] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:29 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x5, 0x0, @multicast1}}}}}, 0x0) 08:13:29 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8847, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:29 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:29 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x6, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2926.197643] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:29 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x600, 0x0, @multicast1}}}}}, 0x0) 08:13:29 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x20032600) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000000)=""/30, &(0x7f0000000040)=0x1e) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:29 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) connect(r0, &(0x7f0000000140)=@ipx={0x4, 0x6, 0x48d6, "1ca7a5d4bae7", 0x10001}, 0x80) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x5, @empty, 0x800}}, 0x9, 0xfffffffffffffffc, 0xffffffffffff8001, 0xfffffffffffffffe, 0x85}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r1}, 0x8) 08:13:29 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:29 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x608, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:29 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xe000, 0x0, @multicast1}}}}}, 0x0) [ 2926.624114] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:30 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:30 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:30 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) socketpair(0xa, 0x80a, 0xca, &(0x7f0000000400)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40401000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r2, 0x1, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x98, r4, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7735}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x54}, 0x810) ioctl$RTC_PIE_OFF(r3, 0x7006) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = perf_event_open(&(0x7f0000000280)={0x2000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r5, 0x0) r6 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e24, 0x4, @mcast1, 0x69fa5e5f}, @in6={0xa, 0x4e23, 0x3ff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, 0x2}, @in6={0xa, 0x4e21, 0xff, @remote, 0x4}, @in6={0xa, 0x4e21, 0x8, @mcast1, 0xd3}, @in6={0xa, 0x4e22, 0x7, @mcast1, 0x2}, @in6={0xa, 0x4e22, 0x2, @local, 0x10001}], 0xb8) 08:13:30 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:30 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x4000000, 0x0, @multicast1}}}}}, 0x0) [ 2926.827181] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:30 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:30 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xfffff000, 0x0, @multicast1}}}}}, 0x0) 08:13:30 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x500000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:30 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:30 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:30 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x200800, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000)=0xffffffff7fffffff, 0x4) bind$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2927.064716] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:30 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xe0000000, 0x0, @multicast1}}}}}, 0x0) 08:13:30 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:30 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x800e000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:30 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2927.242774] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:30 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x20000) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000140)={{0x2, 0x4e20, @multicast1}, {0x304, @broadcast}, 0x35c3ae7cc8d43f88, {0x2, 0x4e20, @multicast1}, 'bridge_slave_1\x00'}) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:30 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:30 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x86ddffff, 0x0, @multicast1}}}}}, 0x0) 08:13:30 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8100000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:30 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x4000) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:30 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000000)={@dev, 0x0}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={@empty, 0x5b, r1}) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:31 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8100000000000000, 0x0, @multicast1}}}}}, 0x0) [ 2927.621726] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:31 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:31 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1400, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:31 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:31 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x8, 0x401, 0x3, 0x0, 0x2, 0x8, 0x5, 0x3, 0x10000, 0x8, 0x4, 0x1, 0xff, 0x3, 0x2, 0x0, 0x1, 0x5, 0xffffffffffff7fff, 0x3, 0x3, 0x4, 0x6, 0x0, 0xe6, 0x200, 0x5, 0x3, 0xd2, 0x1, 0x9, 0x4, 0x7f, 0x3, 0x6, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x2708, 0x3e, 0x0, 0x2, 0x1ffc0000, 0x5, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000300), &(0x7f0000000340)=0xc) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x622}, &(0x7f0000000040)=0x8) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000180)={0x0}) mount$9p_xen(&(0x7f0000000380)='memory.events\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2000000, &(0x7f0000000440)={'trans=xen,', {[{@noextend='noextend'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0[eth1&securityselinuxlo[@lo}cgroup,'}}, {@context={'context', 0x3d, 'staff_u'}}, {@permit_directio='permit_directio'}, {@audit='audit'}, {@obj_user={'obj_user', 0x3d, '*]selinuxmd5sum'}}, {@seclabel='seclabel'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f00000001c0)={r4}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={r3, 0x9, 0x10, 0x8, 0x5}, &(0x7f0000000100)=0x18) [ 2927.810634] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:31 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:31 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8100, 0x0, @multicast1}}}}}, 0x0) 08:13:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x40000002, @local, 0x1}, 0x99) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:31 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:31 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x7, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2927.934013] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2928.005395] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:31 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8000000, 0x0, @multicast1}}}}}, 0x0) 08:13:31 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={@remote, 0x37, r1}) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x3, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:31 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:31 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:31 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x6488, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:31 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x4f80, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2928.183265] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:32 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:32 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x100000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x9, 0x4) 08:13:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:32 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:32 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x80350000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:32 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x208000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000140)=""/244, 0x200000, 0x1800, 0x80000001}, 0x18) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8000, 0x4000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) ioctl$RTC_UIE_ON(r0, 0x7003) bind$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:32 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x88a8ffff, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2928.672782] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:32 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x86ddffff00000000, 0x0, @multicast1}}}}}, 0x0) 08:13:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:32 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x5e5a01, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000280)) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) socketpair(0x10, 0x807, 0x1888, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x2, 0x5, 0x1, 0x4, 0x81, 0x5, 0x6f24, 0x6, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000180)={r3, 0x1, 0x7b, "defbc809166a3ead05db5ef36c21367e642e04b578f1ea7b5cfc0ce98f36c55bd753fd4c6e75e3f97dbfe82dc5fc90a4ffc1015e641547e9ca7ce9e3617a0929ff79192864e64d1d42b4d3dab89ba0de2e2cf1aa55b41b708b2054802862561f6f4764bb2236bf8ae98089f07dbfca914a41dac3fdfe957e86ea15"}, 0x83) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2928.876863] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:32 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f00000001c0)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRESOCT=r0, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYRES64], 0x1039) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r2, 0xfffffffffffffffc}, 0x8) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:32 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x14, 0x0, @multicast1}}}}}, 0x0) 08:13:32 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x600, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x1, @local, 0x1}, 0xff76) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:32 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2929.268981] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:32 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:32 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x1c000000, 0x0, @multicast1}}}}}, 0x0) 08:13:32 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x80000) 08:13:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:32 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000b00)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000040100000c000000000000000000000096000000000000009f7d80ee92c15da7487d8e4f2206a7a4e2b328e2da8480c69ee0400f070ef05e543cdf6522c5d32e40ce603ce220fad9c42134010edc100e9170f84a68c9c8f442b627b3912d5df43b7aa545425f62d1043bd647ab9149096a487fa63f23a455ed6981b1174bfc77d5c23c0f5166147106752da5a2809ef0e1e1aa37a45ef51ad6a5415f18d86dc1b275e1c150e34ebb3e57f317b1ac1eadf5d7792008d3a23360dd69fe88f08ae32e90c504219dfa2eaf19bb657f71c4564a970e9cff996057194ce6ddd5ce6789736fe2aaa3014f4379bf82c69bd3138f5ee8103f01aee98cd1b19dc3166265621d09f3933d16a3e59db09dab7588df2667424baa186f"], 0xae}, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000002c0)="14d1c7e4fa7eee6f4fffee358b7d95b3db1998265a2faba083db8853b427e429a3c8257c2c9abed261810c586787b4fcb0444ba90089d58c241f92cd19cc4e008450fcfc55e01c3f2a00000000d3a605bd1cdc6fa58802420eee99977a90a2eea01c59a069b5cf7f5548ca7294fa071029de00ecf834bb5bf268a0469db92f6da32f428302993bf4328b57510915975b0cf2b18ff88d609f24ed531f0af49c010000cf8b9ae4f8c4f564ebb2d3cc5944137b563d1de43bc0e41f") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x22) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', '\x00'}, &(0x7f0000000380)=""/105, 0x69) 08:13:32 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2929.480031] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x420040, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20, 0x0, @ipv4={[], [], @loopback}, 0x3}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:32 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x80350000, 0x0, @multicast1}}}}}, 0x0) 08:13:33 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x81000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:33 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2929.588197] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:33 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x60000000, 0x0, @multicast1}}}}}, 0x0) [ 2929.688708] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:33 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:33 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0xfffffffffffffcfc) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:33 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x20000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2929.836362] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:33 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x88a8ffff, 0x0, @multicast1}}}}}, 0x0) 08:13:33 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x2000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:33 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000000c0)=""/15) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:33 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:33 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x81000000, 0x0, @multicast1}}}}}, 0x0) 08:13:33 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xe8) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x401, 0x7, &(0x7f0000000640)=[{&(0x7f0000000180)="98c9286deda1c6bde4532e66dc42b8d424762cbfc049da880d715d5d3471f101d1ec204d362a219e8c67e103c4fd0a883ed01f1bcf5d4f2bc1752ead5b48890d4b16fcbce38f47d91dd331c288aab79a2971fd0a6280d78006cbfbe5f41386de9415bc5f6d9a771a4be712e0802e8f9670117b15c554c2586aca9eacdedd0238845de4f1edc9ba4afeb42974d6b0081d6468e01314b6943731219ebaed57d211b737672b9f2b62043c187a77ecacb5b817bcdf84", 0xb4}, {&(0x7f0000000240)="96a6afd5ab05eadbb58d78341516e26d49a5a8cf038d0bb8a12cc2c018033a5b73430f7685e6f9468efdcef11aebcfcac770f634318d4fb476f6ef6f518d209f702f69310f2d88c39f021fad1dc0d3b6f28aebf702fbad7de4360f894acaea06768ba95d9ac9e66d4d9c814c75bb5b852e25186c6fef403c1f3b6c05aaf1418fc62c67c62f046a6bdeed30de5b8428fce2a90c8cd4b6f9d4d24907aed9a636a07fc30dfab3967e5119498d970742149ea1ebb230634e399ebea17c881043311d07e70c22", 0xc4, 0x7fffffff}, {&(0x7f0000000340)="f65506f344586ea52725793e91567f8ac954fcf3e76aaa102e8e46e1000deb4f9324893e018b11027f5b66aaafa1c59df96fa3d2c9f5c24c1324ae9113847306d737d318b5b0a46d8bd53baa41285c2dd90c4759fb79742948a1860fde4aa6fcd9e8594bbce157ca426d9722ae884c86cec7e862edca26e0d1112cb08f5c52b7530d63eae3bc652756a54b077c0192abed59dbb34d0599dd54598f958cde56f4537248e825a24468b49a1bca1c538cb87624bf5a4b", 0xb5, 0x21}, {&(0x7f0000000400)="bb184978deb1600665b8ed9ca6750603610f3b346a89b671c0249ddf66c1730fc5932cd49d7cc27ce11e2ac23e12632416a5799f72d313ddb3014f6e87d5e9c31a15772534e205f2946050b4221c7449d8072b2502", 0x55, 0x10001}, {&(0x7f0000000480)="cdd92f9c5dfa16859d9e04d4812c98a861d78df21b8f097e52886aa5183bbad44426bc10850b502400598b325d8f3974e5d6ddded075e4b1f6b8e928cb6fc72974fc725be102801d090497d99129b59bc57282d71d77a247a28ff20e", 0x5c, 0x6}, {&(0x7f0000000500)="889e493fd40ea3823d9cb195b8963595659e18a40999b9686b12325ad980b016a88e5ba2815b1d0926e80dfabc574df7592eafe68cf79b282a62fb2819990d6e788740ec2f518034e68c03159de22da64939e8e80d1b91159340b03ca995b42022e2f127f474ad74bbd21bc49dd0fc5a8f7e334b28251f17ab05970fda94b09ad101ffce97ec7f4ca3428c8d", 0x8c, 0x10000}, {&(0x7f00000005c0)="4acb2199cbbc92104d53a45c302807ac6ec7a11cb38ff62b637cb3d6d3fd7ada9398529b53d346e236f9dfd006ba30f53082ebb8dfb6fa5c50cd37ff42a313383023d92039aba633222b8cd333d768280a645d104d44ad587ff3863cafdef66788", 0x61, 0x5}], 0x2040800, &(0x7f0000000800)={[{@discard='discard'}, {@logbsize={'logbsize', 0x3d, [0x32]}}, {@uquota='uquota'}, {@nolazytime='nolazytime'}, {@pquota='pquota'}, {@logbufs={'logbufs', 0x3d, 0x3}}, {@usrquota='usrquota'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_measure='dont_measure'}, {@fowner_lt={'fowner<', r2}}, {@fsname={'fsname', 0x3d, 'memory.events\x00'}}, {@seclabel='seclabel'}, {@uid_eq={'uid', 0x3d, r3}}, {@permit_directio='permit_directio'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 2930.331309] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:33 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x500, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:33 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x14000000, 0x0, @multicast1}}}}}, 0x0) 08:13:33 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:33 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) flistxattr(r0, &(0x7f00000001c0)=""/9, 0x9) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) pwrite64(r1, &(0x7f0000000140)="1491ab6d4a66979f298a30acf574bd03f1d2a68a56fef3605b7e0e066b38a6ff09d3cad23e3cd1c7fd63c499c7616c5fa8cefde89cfe8a54f9ec3706089f77060ada76ab92adc65e", 0x48, 0x0) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x2, 0x11, @local, 0x1}, 0xfffffffffffffffb) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x8008000) 08:13:33 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x700, 0x0, @multicast1}}}}}, 0x0) 08:13:33 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x88caffff00000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:34 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2930.552989] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e23, 0x22, @dev={0xfe, 0x80, [], 0x19}, 0x8}, {0xa, 0x4e20, 0x135, @mcast1}, 0x8001, [0x29, 0x89, 0x100, 0x2, 0x80, 0xfffffffffffff0df, 0xc0, 0x3]}, 0x5c) 08:13:34 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:34 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x2000000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2930.823789] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:34 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYBLOB="aa27600e7bbda574fa0d8ac91562b1517c26f0ad01c61b70cb6a88cc4521622c2e216810f6c0591a9b44bc9c42e87e4c18fd08b78434b84c68af830f3672329914ae62e0919ab1be1e2eec3ffb1a51693a290fdfab717a3c5775b67c5e91e6aa074c9e5870798d43d2e3843b26678be3206ae2af257785182ac58429d45cc71a7cfa32b7f83639a3f56f1f19342fa17b32af90e337c66494068c8896f200816b8c36a3dda50524072c3d59a9ac253c996e9424339149661c", @ANYBLOB="4d269a", @ANYRES16=r0, @ANYBLOB="82232612a366f263087751987438bef335f2bda292a9d87a7d0be24c89d66747e4cf9d315f5d681531306be72e6e33868045b17c7db4fdb78c714bda8f9a8312faa66c8532edcc9f93653969c1d0ee691e3f0091033473d6101e099f73801f5ce753130cf494eac76e3afb399d99f051e2f0aa9ad02a48a05886617abf47419f6c41d3de7e43c4c0721bc74e35d145d2b88f266b93eabf5bc0b7216694b88d13f6999f5c6f21bb146e6c7a5aa11e9f573e1179c31e86c6c7b42bcdd28d7638b611d9cfe34c5e50e6666c156d205762e000e2a76b978cd2a92a5b05f7e58564e1b2a0"], 0x102e2) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000)=0xfffffffffffff000, 0x4) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:34 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:34 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x4305, 0x0, @multicast1}}}}}, 0x0) 08:13:34 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/pys/n/vs/nat_icmp_sgnd\x00\x00\x00A\x8f\xdf>\xe7\xdcZ\xfa\x00\x00\x00K\xb1:xqA%b\x16\xfe\xb6\xe6h\n\xcb\x13%\x8d\xdbX\x9f\'MR\xe3\xe4<\xe5', 0x2, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000280)={0x10000, 0x0, 0xfffffffffffffffc}) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100000000, 0x20080) getsockopt$inet_buf(r2, 0x0, 0x27, &(0x7f0000000140)=""/199, &(0x7f00000000c0)=0xc7) 08:13:34 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3f000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:34 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x88640000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2931.126586] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:34 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendto$inet6(r0, &(0x7f0000000380)="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", 0x1000, 0x1, &(0x7f0000000140)={0xa, 0x4e21, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, 0x1000}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) init_module(&(0x7f0000000000)='!%\x00', 0x3, &(0x7f00000000c0)='securitysecurity[\xd2)cpusetbdevselfcpusetvboxnet1cgroupproc\x00') sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:34 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x2000, 0x0, @multicast1}}}}}, 0x0) 08:13:34 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:34 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x14, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2931.383059] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:35 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000000c0)={0xe, 0x3, 0x4, 0x2, 0x12, "7c6ff0f2f24e90185e2f4bd4f90bd6033d48"}, 0x1e) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:35 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x6000000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:35 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000680)='/dev/adsp#\x00', 0x2, 0x800) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/audio\x00', 0x800, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000580)='\x01\x00\x00\x00\x01nQs\x00_\xb9\x9d\xder8\vU\x98\xeb{Py+\xc5\xee\xaeCM\x03w,\x8a3\xf6\\\x00!\f\x113HVB\xb9T.fe\n\xe4;g\xdcv\x9a\x9b\x9b\xc3\xb2\x15`\xb0Y\xac\xbe\x7f\xbb\xc8\xafF\x00D\xcb\xdaE\xfbmn]A\x7fg[\x95\xc2\x18\xff\x81\xc3\xcf\x01\xe9\xfd\x00\x00\x00\x00\x00\x00\x0f\x8b\xfa\x94\x95.\a\xc40\xd5[\xee\xf8m\xe3\xd5\x86mO\xe2\xea\x03\x04\xc3w#%\x19\xcc8\x0eT\x1c\xa1\xec\x8a\xa1\xf7IT\xb9\xde]\xbd\xac\\\xc4fI\x9a\xc0\xe6I\xdd\x85\xc3\xe7R\x1c\xef\xa1\x9d\xab\x89\xe8\xe4\xd9\x8c\x93\xa5\xd6\x02\xe8\xad\x01~\xa3\a\xfaMK\x121\xf0\xbf\xeb7\xecD\xd81\x05\xb5\xdf\xabl\xb5\xca?#\xde\xba', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f00000000c0)={@remote, @dev={0xac, 0x14, 0x14, 0xf}}, 0x8) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) sendmsg$nl_crypto(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000001}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@alg={0x100, 0x10, 0x200, 0x70bd27, 0x25dfdbfc, {{'ctr-cast6-avx\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x80}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x80000001}, {0x8, 0x1, 0x7}]}, 0x100}, 0x1, 0x0, 0x0, 0x800}, 0x800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x3, 0x10}, &(0x7f0000000280)=0xc) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000002c0)={r5, 0x7}, 0x8) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:35 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x4000000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:35 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2931.743597] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:35 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1c00, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:35 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x2000000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x7) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:35 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '-'}], 0xa, "d0cdba5c2f6e810acbb72da1f8bb144cb006d5546a35e8a3e835c45a"}, 0x29) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000000)={0x6, "72599fce03d51772d43835b303f7505bf47de8c85b2135a87b04121be567ae42", 0x2, 0x8, 0x80000000, 0x2, 0x3}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80081, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000000c0)=0x800, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000140)) 08:13:35 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:35 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x1400000000000000, 0x0, @multicast1}}}}}, 0x0) [ 2931.989505] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:35 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xe000000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:35 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:35 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x20000000, 0x0, @multicast1}}}}}, 0x0) 08:13:35 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r2 = geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)=0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={r1, r2, r3}, 0xc) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0xfffffffffffffffd, @local, 0x1}, 0x1c) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2932.216624] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:35 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x43050000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2932.264935] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:35 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2932.461358] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:36 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0xe0, 0x0, @multicast1}}}}}, 0x0) 08:13:36 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x689, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) close(r0) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000140)={0x0, 0x1, 0x0, &(0x7f00000000c0)=0x1}) socket$inet_smc(0x2b, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:36 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:36 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x1c8) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) r2 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) request_key(0x0, 0x0, 0x0, r2) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18, 0x71, 0x2, {{0x4, 0x0, 0x6}, 0xffffffff00000000}}, 0x18) 08:13:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:36 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x800000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2932.869727] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:36 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x1400, 0x0, @multicast1}}}}}, 0x0) 08:13:36 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2932.914014] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x100, 0x0, 0x80}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x6, 0x2, 0x8, 0x2, r1}, &(0x7f0000000180)=0x10) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:36 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000180)) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/148, &(0x7f0000000100)=0x94) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:36 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:36 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8848000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2933.096075] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:36 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8847000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r2, 0x3c, 0x0, @ib={0x1b, 0x100000000, 0x4, {"5492d801064bc661bfb07c219fc1dd85"}, 0x8, 0x7, 0x7bd8}}}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000240)={r0}) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) ioctl$RTC_UIE_OFF(r1, 0x7004) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:36 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x700, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:36 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2933.296259] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:36 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x8035000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:36 executing program 3: r0 = socket$inet6(0xa, 0x80f, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f00000000c0)=0xffff, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:36 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xffffca88, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2933.514426] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:37 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x7, 0x40) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000040)=0x99fd, 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:37 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:37 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x6, 0x0, @multicast1}}}}}, 0x0) 08:13:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x4e24, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:37 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xe80, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2933.908699] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:37 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0xfffffffffffffe09) 08:13:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:37 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1=0xe0000006}}}}}, 0x0) 08:13:37 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:37 executing program 5: 08:13:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x400, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2934.100613] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:37 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:37 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xfffff000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:37 executing program 5: 08:13:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:37 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1=0xe0000008}}}}}, 0x0) [ 2934.320415] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:37 executing program 5: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x2000000000000000, 0x0, @multicast1}}}}}, 0x0) 08:13:37 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e21, 0x8000, @mcast1, 0x4}, {0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x18}, 0x20}, 0x8, [0x7fff, 0x3f, 0x101, 0x9, 0x9, 0xc2, 0x819f, 0x2]}, 0x5c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:37 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1=0xe0000003}}}}}, 0x0) 08:13:37 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3f00, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:37 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:37 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x28, 0x0, 0x3, "1b3f9928c9fc4a2c3eee5e3e7579b67b2fe7633f94a4c1358170353d766934da0febd454fa0d6b9b"}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000000)) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 2934.496950] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040)=0x8, 0x4) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x6) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:38 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1=0xe0000004}}}}}, 0x0) 08:13:38 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:38 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1c, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:38 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x1f, &(0x7f0000000040)=0x8, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x2, @mcast2}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getcwd(&(0x7f0000000140)=""/211, 0xd3) [ 2934.784408] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:38 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1=0xe0000012}}}}}, 0x0) 08:13:38 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x6000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:38 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x3, 0x0) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0xa6444e8e2ed23f29, @host}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) ftruncate(r1, 0x3) bind$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0xf350, 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400000, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{0x2, 0x3, 0xfffffffffffffff7, 0x7fff}, {0x8, 0x4, 0x9, 0x8}, {0x100000001, 0x8, 0xffffffffffffff81, 0x24}, {0x80000000, 0x80000000}, {0x9, 0x5, 0xfff, 0x1}, {0x4a6c, 0x2, 0x1, 0x20}, {0x1000, 0x100000000, 0x6, 0x4}]}) sendto$inet6(r1, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2935.027717] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:38 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:38 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:38 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1=0xe0000002}}}}}, 0x0) 08:13:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x111001, 0x0) write$P9_RFSYNC(r1, &(0x7f00000000c0)={0x7, 0x33, 0xfffffffffffffffd}, 0x1) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000200)=""/181, 0xb5}, {&(0x7f00000002c0)}, {&(0x7f0000000300)=""/43, 0x2b}, {&(0x7f0000000380)=""/160, 0xa0}], 0x4}}, {{&(0x7f0000000480)=@rc, 0x80, &(0x7f0000000540)=[{&(0x7f0000000500)=""/47, 0x2f}], 0x1}, 0x7}], 0x2, 0x22, &(0x7f0000000600)={0x0, 0x989680}) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20, 0xd6}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000140)=0x6) 08:13:38 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x88a8ffff00000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2935.224750] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:38 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x9, 0x400000) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000140)=0x8) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000240)={0x5, 0x0, [{0x8, 0x5, 0x0, 0x0, @msi={0x4, 0x4, 0x166}}, {0x4c9, 0x3, 0x0, 0x0, @adapter={0x401, 0x425b, 0x9, 0x9, 0x18000000000}}, {0x5, 0x3, 0x0, 0x0, @msi={0x1, 0x5ee, 0x8}}, {0x400000, 0x3, 0x0, 0x0, @msi={0x8, 0x2, 0x6}}, {0x1f, 0x3, 0x0, 0x0, @sint={0x81, 0x5}}]}) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000000)=0x68) 08:13:38 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:38 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1=0xe000f000}}}}}, 0x0) 08:13:38 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8906, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2935.316781] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2935.469789] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:39 executing program 5: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x3580, 0x0, @multicast1}}}}}, 0x0) 08:13:39 executing program 0: r0 = socket$inet(0x2, 0xc0007, 0x10006) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x7, 0x6, &(0x7f0000000140)=@raw=[@jmp={0x5, 0x401, 0x5, 0x4, 0x8, 0xde, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x17}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x3}, @exit, @ldst={0x1, 0x0, 0x6, 0x2, 0x2, 0x100, 0xffffffffffffffff}], &(0x7f0000000180)='syzkaller\x00', 0x90dd, 0x18, &(0x7f00000001c0)=""/24, 0x0, 0x1, [], r1, 0x9}, 0x48) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaa0200000000000002907800000000e49055e4c9744c18bc338005ffffff00da44aa2cf993070dac34392c00000000000000000000"], 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_FP_MODE(0x2d, 0x0) 08:13:39 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:39 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8100, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2935.904422] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:39 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x20044e20}, 0xfffffe67) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:39 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4305, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:39 executing program 5: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:39 executing program 0: r0 = socket$inet(0x2, 0x807, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0xd76, 0x10000) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x10, 0x70bd28, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40001) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000100)={0x4, 0x0, 0x1, 0x3, 0x2}, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cpu.weight.nice\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x6) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x210402, 0x0) ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f0000000140)={[{0x7fff, 0x0, 0xc66, 0x1b, 0x401, 0x2, 0x3, 0xeb4, 0x0, 0xfffffffffffffffd, 0x100000001, 0xcb26, 0x3f}, {0x6, 0x6, 0x5, 0x6, 0x8, 0x3, 0x75df, 0x9, 0x100, 0x2, 0x2, 0x76, 0x200}, {0x1f, 0x1, 0x0, 0xaa5, 0x800, 0x1, 0x4, 0x7ff, 0x0, 0xa3d3, 0x100000000, 0x101, 0xfffffffffffffff7}], 0x1f}) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) [ 2936.148444] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:39 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:39 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 08:13:39 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x543, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:39 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500001c000000000002907800000000ffffffff1100ef5ee46f061444cf328b7692a6c19078e0000001"], 0x0) [ 2936.329273] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) sysfs$1(0x1, &(0x7f00000000c0)='\xb6\xe2\xc0I;\xfc\xc3\xc7\xe2\x93J_O\x9d\vS3\xfc\xa2\a\xa84&\xcf\xb3\xc2wk\x11\xe2\xf1\x01\x8e\xb1jD\x1c\'X^\xd4nB\xbb2\x8a+\xceF6y\x9f\xa9\xd5Vx\xe1n\xaf&\x89\xf5') setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) 08:13:39 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:39 executing program 0: r0 = socket$inet(0x2, 0x805, 0x7) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000140)={{0x1, 0xf000, 0xf, 0x100000001, 0x8, 0x6, 0x8000, 0x7, 0x7, 0x401, 0x7, 0x8}, {0x100000, 0xf000, 0x0, 0x0, 0x4, 0x3, 0x2f7, 0xfffffffeffffffff, 0x6c, 0x3f, 0x1}, {0x1000, 0x1000, 0x4, 0x9, 0x9, 0x3, 0xe4, 0xfffffffffffffeff, 0x9, 0x8, 0x800, 0x6}, {0x14000, 0xf000, 0x9, 0x0, 0xd182e9e, 0x46b, 0x3, 0x66d, 0x1ff, 0xff, 0x800, 0x7f}, {0x0, 0x0, 0xd, 0x8000, 0xe, 0x8, 0x1000, 0x2, 0x80000001, 0xa19a, 0x3, 0x8}, {0x4004, 0xf000, 0xe, 0x1, 0x3, 0x1, 0x3, 0x1, 0x1a, 0x1, 0x80, 0x9}, {0x2000, 0x1000, 0xf, 0x0, 0x6, 0x6, 0x7, 0xf1, 0x0, 0xfff, 0x5, 0x200}, {0x2, 0x6000, 0x14, 0xe5, 0x2be, 0x4, 0x3ff, 0x3, 0x3, 0x9, 0x100000000, 0x2}, {0x1000, 0x5000}, {0x12001}, 0x20, 0x0, 0x0, 0x20008, 0xa, 0x800, 0x10f004, [0x8, 0x5, 0x5, 0x8]}) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:39 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4305000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:40 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2936.535091] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0xadb, @mcast2}, 0x1) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:40 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:40 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x89060000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2936.749662] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:40 executing program 5: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3f00000000000000, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:40 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:40 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x7f}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$netlink(r1, 0x10e, 0x3, &(0x7f0000000040)=""/4, &(0x7f0000000000)=0x4) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="71d3f23dffffff000000400000000000000078e01587f1f0c0a28086f075cd81f0ff366b806c9fa81f4d6fb0289ed47c"], 0x0) 08:13:40 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x44e20, 0xffffffffffffffff}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x41007701, 0x0) r6 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) acct(0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) r10 = getegid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="78020000000000000700000000000000020000000000000000000000000000000300000000000000000000000000000001000000030000000100000000000000020000000000000004000000000000001f00000000000000fe00000000000000ffff00000000000002000000010100000b750000ab0b000000000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="ff03000005000000000000000200000000000000ff070000000000000000000005000000000000000000000000000000000000000700000000000000060000000000000007000000010000000400000000000000070000000000000009000000000000000180000000000000ff03000000000000060000000000000007000000d0ee0000000000000002000000000000", @ANYRES32=r4, @ANYRES32=r6, @ANYBLOB="01000000020000000000000006000000000000fff100000000000000000000002c000000050000010001000000000000000000000000000000000000080000000000000001000000040000000300000000000000080000000000000000000000000000000400000000000000070000000000000005000000000000001b06000021003315281f98c1a41e000035000000", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="0200000005000000000000000400000000000000050000000000000001000000f8ffffffdf00000000000000000000000000000001000000000000000100000000000000810000000000000001040000ed000000050000000000000000000000000000000400000000000000f7ffffffffffffff0600000000000000a960000000000000ff7f0000020000000f5b00000000000000f0ffff", @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="02000000ff00000000000000050000000000000000000000000000000000000001000000"], 0x278) 08:13:40 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xe000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:40 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x60, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2937.087642] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000ffb000/0x2000)=nil) setsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000280)=0xe4, 0x4) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f00000000c0)={0x0}) syz_open_pts(r1, 0x40) r3 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x80010, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x2c, 0x0, &(0x7f0000000140)=[@increfs_done={0x40106308, r2, 0x4}, @exit_looper, @register_looper, @enter_looper, @free_buffer={0x40086303, r3}], 0xa0, 0x0, &(0x7f0000000180)="d19a7fe1f2585afaaee01cfd79a550775f31ba7cb4f6814ff61b3d8eda640fb4830afa576a66116b9d520045209edace63ce264af1a54244e7fc2992d87784be0706bd0c0db557baa2ccdbb6f35960913969519292ac37aec32067ebaab56ba2ecdb0f42f44b9292663ce3b806aaa5094d2538fd78846968b059575cdb1a66476c88ce0d2283d42adbd47eec566d03b252a7e1f0104f595bbe47b0637512a891"}) getpeername$tipc(r1, &(0x7f00000002c0)=@id, &(0x7f0000000300)=0x10) 08:13:40 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x400001, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x0) 08:13:40 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:40 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:40 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x44e20, 0xffffffffffffffff}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x41007701, 0x0) r6 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) acct(0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) r10 = getegid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="78020000000000000700000000000000020000000000000000000000000000000300000000000000000000000000000001000000030000000100000000000000020000000000000004000000000000001f00000000000000fe00000000000000ffff00000000000002000000010100000b750000ab0b000000000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="ff03000005000000000000000200000000000000ff070000000000000000000005000000000000000000000000000000000000000700000000000000060000000000000007000000010000000400000000000000070000000000000009000000000000000180000000000000ff03000000000000060000000000000007000000d0ee0000000000000002000000000000", @ANYRES32=r4, @ANYRES32=r6, @ANYBLOB="01000000020000000000000006000000000000fff100000000000000000000002c000000050000010001000000000000000000000000000000000000080000000000000001000000040000000300000000000000080000000000000000000000000000000400000000000000070000000000000005000000000000001b06000021003315281f98c1a41e000035000000", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="0200000005000000000000000400000000000000050000000000000001000000f8ffffffdf00000000000000000000000000000001000000000000000100000000000000810000000000000001040000ed000000050000000000000000000000000000000400000000000000f7ffffffffffffff0600000000000000a960000000000000ff7f0000020000000f5b00000000000000f0ffff", @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="02000000ff00000000000000050000000000000000000000000000000000000001000000"], 0x278) 08:13:40 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x4}, {{@in=@remote}, 0x0, @in6=@loopback, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0xe8) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000140)=0x7, 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaffff0002907800000000ffffff2112009078fffeffff"], 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) 08:13:40 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x2, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:40 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x7c, r1, 0x405, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x17}}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffffc}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xe6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1f}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x20000044) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2937.347932] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:40 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:40 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:40 executing program 5: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2937.493496] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:40 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x100000000, 0x7}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0x0, 0x6}, &(0x7f00000001c0)=0xc) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000240)={0x1, 0x7fff, 0x5daa, 0x7ff, 0x6, 0x0, 0x80000001, 0x17, 0x4, 0x6}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:40 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:41 executing program 3: r0 = socket$inet6(0xa, 0x4, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000200)={@pppoe={0x18, 0x0, {0x3, @remote, 'nr0\x00'}}, {&(0x7f0000000140)=""/88, 0x58}, &(0x7f00000001c0), 0x9}, 0xa0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) 08:13:41 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:41 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:41 executing program 5: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x6488, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2937.697350] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:41 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2e, &(0x7f0000000100)={@local, @broadcast, [{[], {0x8100, 0x9, 0x101, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:41 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:41 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8864, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:41 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2937.862420] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:41 executing program 5: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:41 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:41 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x60000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:41 executing program 0: r0 = socket$inet(0x2, 0x1, 0xffffffffffffffd9) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)={0x0, 0x0, 0xe42}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000001c0)={r2, r3, 0x4}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000200)={0x2, 0x4, 0x14c8, 0x88, 0x50, 0x8, 0x5, 0x0, 0x80000000, 0x2, 0x80}) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:41 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:41 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) [ 2938.059729] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2938.088194] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:41 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:41 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x3) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f0000000140)={0x1, "d8b40085dbdefbb420d8083ee585c174f026fd851a32b2db7c1177211411590c", 0x10, 0x3ff, 0x15c00000, 0x4}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800450000fc0101ff000000ff9c14f015ff110000000000"], 0x0) 08:13:41 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:41 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:41 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) [ 2938.334555] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:41 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:41 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x400000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:41 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_dccp_buf(r0, 0x21, 0x0, &(0x7f0000000100)="8f7116ffb29b4ff2c07a1249094478191571ad922652ec5e00f4cfc3", 0x1c) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:41 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:41 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7005) 08:13:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x80, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) prctl$PR_SET_ENDIAN(0x14, 0x1) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0xffffffffffffffff, 0x0) [ 2938.536357] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:42 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xd00000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:42 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040009, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:13:42 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff180045000062430000000000007800000000ffffffff11009078e0b3f60304323db23fb49f7be5c4bfe8c78469603677e5e7894deec94c204a1e9c08974016dfa30a71d7787b8760b1666b1301fac4507a0877bc94f5eac392fb36194df6bc666facf90459d1dadd40d72911bc4fa6fcc39020edbf2c372509cfbe6b4382f38e657c8f8cd00e4728e3d0f72d63791929ff9a0660166c1efa6983"], 0x0) 08:13:42 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:42 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x80287010) [ 2938.815586] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:42 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="48000000140019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 08:13:42 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1c000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:42 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:42 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:42 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) r1 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) syz_open_procfs(r3, &(0x7f0000000180)='net/ip6_tables_targets\x00') ioctl$VT_RELDISP(r2, 0x5605) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x4, 0x9e, [], 0x1, &(0x7f00000001c0)=[{}], &(0x7f0000000200)=""/158}, &(0x7f0000000340)=0x78) 08:13:42 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x40087602) 08:13:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="48000000140019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 08:13:42 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xffffa888, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2939.082803] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="e03f0300140019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 08:13:42 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x4, 0x2000) write$apparmor_current(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7065726d70726f66696c652023656d3070707031657468306589363000"], 0x1d) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:42 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x4024700a) 08:13:42 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:42 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:42 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x800e0000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:42 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0xc020660b) 08:13:42 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) r1 = msgget$private(0x0, 0x40) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgrp(0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) msgctl$IPC_SET(r1, 0x1, &(0x7f00000004c0)={{0x0, r2, r3, r4, r5, 0x84, 0x9}, 0x9, 0x1000, 0x1, 0x3f, 0x6, 0x0, r6, r7}) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="00f0ff7f140019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) [ 2939.370119] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:42 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:42 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:42 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xd000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:42 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x5460) 08:13:43 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000900)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x6f, &(0x7f0000000940)=0x1000, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@local}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES16=r0], @ANYRESHEX=r0, @ANYBLOB="c292d3622563ac01a6ded069cc2838c46402676f691922203ea7bfed632e426b24243ecbd823ce52e88f130a0e9d4213c2264f90745cb9c5c57c8289e308d8b918e1d33c4ec1f24f730473599119e46af8a2f3c6e83a76dc2a3a76ad10e2267f551b723c5aaf893a55334c907c14e91bc3b6aa0e4867c66a5d70029101c7e8aa90ef8d21666381fe440f1f7becabb95adfdd795c3ed1f3a2f32538e22ef53ebaa7ff2c00ad26866c947f6713633644b38ccdf013e56b805a591de8ea527707a2668d16941951da684aab6510248147c5beccb630ed9f815034c7ba5550e3683bfacc51c31e3f6b8cc075f02a08", @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT=r0, @ANYBLOB="5e363369b9956e93130e48533f8a8ccbaebd66b91bc6e3a8f15d921164c82ce064ef1d27defa44b8ddb0e1c10256fd84f33e3504e4effcd04b4bbe57be4bdc86ccae4f92cc8c783b0d91edbd51367f45382987adce83e2c71f09ac5d5f4964551531a4187abd651248998e71a6de83a8b92be90b14204906700ff44effe65997db60cb4a9c22ff2728d344b1100b1288bb5b84515af6e5cd92f23773d26420434c9ba91a6127b889c9fc0e44c7517a7dfc7ad2d4819eccc8667785029ac5cddb983db16edbb49caf917ac0ee1becd53766fc3452683a7bdfb86da65627caafc0050d625dcb5f4e0cdd661d78b6c0fd0238c27f", @ANYRES32=r0], @ANYRES64]], 0x0) 08:13:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="effd0000140019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 08:13:43 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x80086601) 08:13:43 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2939.661332] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:43 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0xfffffffffffffefe) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:43 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:43 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:43 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x80247008) 08:13:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="effdffff140019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 08:13:43 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xd00, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2939.924471] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="c0000000140019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 08:13:43 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000380)=ANY=[@ANYBLOB="e28c6f1d5e7b77eae1a5aaaaaaaaaaaaffffffffffff08004500001c000000001602907800000000ffffffff11009078e0000001335ebf2a02e5e906ed1e66e6bf1e90f4"], 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x8080, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000180)={0x0, 0x2}) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000002c0)={'filter\x00', 0x0, 0x4, 0x0, [], 0x9, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000280)}, &(0x7f0000000340)=0x78) 08:13:43 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x4b47) 08:13:43 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:43 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x100000000000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:43 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:43 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x40247007) 08:13:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="0f000000140019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 08:13:43 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000440)='/dev/md0\x00', 0x1, 0x0) r1 = socket$inet(0x2, 0x80003, 0x7) ptrace$getregs(0xc, 0x0, 0x4, &(0x7f0000000240)=""/230) r2 = getpgid(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) kcmp(r2, r3, 0x5, r1, r1) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) ptrace$setregs(0xf, r4, 0xffffffffffff1e9d, &(0x7f0000000180)="e957a62cd3d1e5dfb29ea6f8544ad6923fa2e43df5053c530948a27f941a76311e7dbd40664863c13502845d24bf05aed291af41ec52442c092cea955530dcb03629bfcf4003ee3a47b6b83d7bd647e0e4bada9389ecee0bb404cfb67ad7ea32506f57c823969b2f195da3c247c6d50f0ae862c3ea4a67f16ac75d95157c59dd42284c318b5576f557d7b52b419ad8604d72864452b4aa3597bedd1ebbab3779dc8d9218ebc4d24a") connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) poll(&(0x7f0000000480)=[{r0, 0x120}, {r0, 0x3200}, {r0, 0x1100}, {r1, 0x434}, {r0, 0x2}, {r1, 0x1}, {r1}], 0x7, 0x9) ptrace$getregset(0x4204, r2, 0x203, &(0x7f0000000400)={&(0x7f00000003c0)=""/13, 0xd}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="8aaaaaaaaaaaffffffffffff08004500000930a13db446e51c0000000000009078e0000001"], 0x0) [ 2940.198731] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:43 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:43 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xffffffff00000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:43 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="c00e0000140019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 08:13:43 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0xc0189436) [ 2940.375481] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:43 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaffff0900b0ae08004500001c000000f2000290780000003b0ae48c7738a40700ffffff11009078e0000001ae7b208ffaa1db55c089a591a000f8f5f5b5cbe6549473198c37a014312762341440199b9413cf32ca4275d33fafe9b43e8935e5fdc226feeddbe2009ec19409a5835cf55ea2a8a4a94b68023e4cd1bdfa522ad63ad56f52570d85c4e0000f729f87a8bf168a1769f70db432"], 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x6, 0x200000) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000140)) 08:13:43 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:43 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="08020020140019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 08:13:44 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xfffffffffffff000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:44 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x80087601) 08:13:44 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'nat\x00', 0x19, 0x3, 0x438, [0x20000140, 0x0, 0x0, 0x20000170, 0x20000468], 0x0, &(0x7f0000000100), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x13, 0x49, 0x8906, 'veth1_to_bond\x00', 'eql\x00', 'nr0\x00', 'veth1_to_team\x00', @broadcast, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @empty, [0xff, 0xff], 0x100, 0x138, 0x170, [@ipvs={'ipvs\x00', 0x28, {{@ipv4=@empty, [0x0, 0xff, 0xffffffff, 0xffffff00], 0x4e20, 0x0, 0x5, 0x4e24, 0x0, 0x21}}}, @connbytes={'connbytes\x00', 0x18, {{0x40, 0x5, 0x1}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}]}, @snat={'snat\x00', 0x10, {{@random="e3b439f7347f", 0xfffffffffffffffe}}}}, {{{0x7, 0x2, 0x6001, 'eql\x00', 'tunl0\x00', 'bcsh0\x00', 'eql\x00', @broadcast, [0xff, 0xff, 0x0, 0x0, 0xff], @random="041ab0bd4bc7", [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], 0x70, 0x120, 0x158}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0xef17, 0x0, 0x3, 0x0, 0x0, "37d6c9167949f1f94eae21d7b9917285b0c6a9fc5aa08e996f915bbe8bd90aaff5d0dde2d7f71c4fbcd341adbb68adb9fa5d5750ea7a04595cdac29f5c009fb0"}}}, @snat={'snat\x00', 0x10, {{@remote, 0xfffffffffffffffe}}}]}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0xd, 0x40, 0x0, 'gretap0\x00', 'veth0\x00', 'bcsh0\x00', 'ip6tnl0\x00', @empty, [0x0, 0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}}]}]}, 0x4b0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) r1 = memfd_create(&(0x7f0000000600)='nr0\x00', 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000680), 0x2, 0xb}}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') [ 2940.661749] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="48003f00140019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 08:13:44 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6, 0xffffffa4}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:44 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:44 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x5, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 2940.798004] kernel msg: ebtables bug: please report to author: bad policy 08:13:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="48000000150019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 08:13:44 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x5450) [ 2940.855093] kernel msg: ebtables bug: please report to author: bad policy 08:13:44 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6, 0x1000000}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) [ 2940.911932] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:13:44 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x4e24}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x10000}, {0x0, 0x0, 0x1000000000000000}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x4, 0x40000) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:44 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000640)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x86ddffff00000000, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1}}}}}, 0x0) 08:13:44 executing program 4: r0 = socket$inet(0x2, 0x80003, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6, 0x14}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0xe8) 08:13:44 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0xc0045878) 08:13:44 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000040, 0x20000220, 0x20000250], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'team_slave_0\x00', 'veth0\x00', 'rose0\x00', 'ip_vti0\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"8fd4adcdae6951884831c015eec6f6aca190f528b8d962e0fb9a6021851f"}}}]}]}, 0x1c0) 08:13:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="480000000f0019b469a81014aed182f30284470080ffe0060000000000050000005603ca0016087f89000000200000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) [ 2941.170045] ------------[ cut here ]------------ [ 2941.175296] refcount_t: increment on 0; use-after-free. [ 2941.181097] WARNING: CPU: 1 PID: 19265 at lib/refcount.c:153 refcount_inc_checked+0x5d/0x70 [ 2941.189619] Kernel panic - not syncing: panic_on_warn set ... [ 2941.195522] CPU: 1 PID: 19265 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #156 [ 2941.202907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2941.208440] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=15 sclass=netlink_tcpdiag_socket pig=19272 comm=syz-executor3 [ 2941.212265] Call Trace: [ 2941.212303] dump_stack+0x244/0x39d [ 2941.212325] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2941.212427] panic+0x2ad/0x55c [ 2941.239187] ? add_taint.cold.5+0x16/0x16 [ 2941.243372] ? __warn.cold.8+0x5/0x45 [ 2941.247206] ? refcount_inc_checked+0x5d/0x70 [ 2941.251727] __warn.cold.8+0x20/0x45 [ 2941.255470] ? rcu_softirq_qs+0x20/0x20 [ 2941.259458] ? refcount_inc_checked+0x5d/0x70 [ 2941.263972] report_bug+0x254/0x2d0 [ 2941.267677] do_error_trap+0x11b/0x200 [ 2941.271594] do_invalid_op+0x36/0x40 [ 2941.275323] ? refcount_inc_checked+0x5d/0x70 [ 2941.279852] invalid_op+0x14/0x20 [ 2941.283321] RIP: 0010:refcount_inc_checked+0x5d/0x70 [ 2941.287708] kobject: 'loop0' (00000000c87bda39): kobject_uevent_env [ 2941.288573] Code: 1d c2 bb 80 06 31 ff 89 de e8 8f 78 ed fd 84 db 75 df e8 b6 77 ed fd 48 c7 c7 40 b7 60 88 c6 05 a2 bb 80 06 01 e8 b3 d7 b6 fd <0f> 0b eb c3 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 [ 2941.298856] kobject: 'loop0' (00000000c87bda39): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2941.313891] RSP: 0018:ffff8881bc306ce0 EFLAGS: 00010286 [ 2941.313906] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90008362000 [ 2941.313917] RDX: 000000000000f917 RSI: ffffffff8165e495 RDI: 0000000000000005 [ 2941.313928] RBP: ffff8881bc306ce8 R08: ffff8881d2bc0080 R09: ffffed103b5e3ef8 [ 2941.313939] R10: ffffed103b5e3ef8 R11: ffff8881daf1f7c7 R12: 0000000000000000 [ 2941.313950] R13: 0000000100040b0b R14: ffff8881cbfd11c0 R15: dffffc0000000000 [ 2941.313983] ? vprintk_func+0x85/0x181 [ 2941.314009] igmp_start_timer+0xaf/0xe0 [ 2941.314029] igmp_rcv+0x1a62/0x3220 [ 2941.376652] ? perf_trace_lock+0x7a0/0x7a0 [ 2941.380905] ? debug_smp_processor_id+0x1c/0x20 [ 2941.385603] ? ip_mc_leave_group+0x4b0/0x4b0 [ 2941.389988] kobject: 'loop5' (00000000e1bec0ea): kobject_uevent_env [ 2941.390038] ? lock_is_held_type+0x210/0x210 [ 2941.390091] ? kasan_check_read+0x11/0x20 [ 2941.402632] kobject: 'loop5' (00000000e1bec0ea): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2941.405043] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2941.405061] ? rcu_softirq_qs+0x20/0x20 [ 2941.405085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2941.405102] ? raw_local_deliver+0x2ca/0xc3a [ 2941.405126] ? zap_class+0x640/0x640 [ 2941.426797] kobject: 'loop4' (00000000570b67e8): kobject_uevent_env [ 2941.429373] ? zap_class+0x640/0x640 [ 2941.429395] ? lock_acquire+0x1ed/0x520 [ 2941.429415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2941.429434] ? check_preemption_disabled+0x48/0x280 [ 2941.429462] ? __lock_is_held+0xb5/0x140 [ 2941.440054] kobject: 'loop4' (00000000570b67e8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2941.444082] ip_local_deliver_finish+0x2e9/0xda0 [ 2941.444109] ? ip_sublist_rcv_finish+0x3a0/0x3a0 [ 2941.444129] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2941.444146] ? nf_hook_slow+0x11e/0x1c0 [ 2941.444169] ip_local_deliver+0x1e9/0x750 [ 2941.498554] ? ip_call_ra_chain+0x730/0x730 [ 2941.502896] ? ip_sublist_rcv_finish+0x3a0/0x3a0 [ 2941.507666] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2941.512608] ? kasan_check_read+0x11/0x20 [ 2941.516775] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2941.521854] ? rcu_softirq_qs+0x20/0x20 [ 2941.525864] ip_rcv_finish+0x1f9/0x300 [ 2941.529788] ip_rcv+0xed/0x600 [ 2941.533008] ? ip_local_deliver+0x750/0x750 [ 2941.537352] ? pvclock_read_flags+0x160/0x160 [ 2941.541876] ? ip_rcv_finish_core.isra.16+0x1f40/0x1f40 [ 2941.547269] ? lock_acquire+0x1ed/0x520 [ 2941.551318] __netif_receive_skb_one_core+0x14d/0x200 [ 2941.556534] ? __netif_receive_skb_core+0x3b30/0x3b30 [ 2941.561741] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2941.567038] ? rcu_softirq_qs+0x20/0x20 [ 2941.571037] __netif_receive_skb+0x2c/0x1e0 [ 2941.575393] netif_receive_skb_internal+0x12c/0x800 [ 2941.580427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2941.585978] ? dev_cpu_dead+0xac0/0xac0 [ 2941.589978] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2941.595538] ? eth_type_trans+0x2ea/0x760 [ 2941.599706] ? eth_gro_receive+0x920/0x920 [ 2941.603986] napi_gro_frags+0x75a/0xc90 [ 2941.607984] ? napi_gro_receive+0x5f0/0x5f0 [ 2941.612330] ? eth_get_headlen+0x173/0x1f0 [ 2941.616585] ? eth_type_trans+0x760/0x760 [ 2941.620760] ? tun_get_user+0x3160/0x4250 [ 2941.624934] tun_get_user+0x3189/0x4250 [ 2941.628950] ? debug_smp_processor_id+0x1c/0x20 [ 2941.633724] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 2941.634308] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 2941.638869] ? tun_net_xmit+0x1c90/0x1c90 [ 2941.638884] ? zap_class+0x640/0x640 [ 2941.638905] ? lock_is_held_type+0x210/0x210 [ 2941.638939] ? futex_wake+0x304/0x760 [ 2941.638964] ? find_held_lock+0x36/0x1c0 [ 2941.661026] kobject: 'loop0' (00000000c87bda39): kobject_uevent_env [ 2941.663184] ? tun_get+0x206/0x370 [ 2941.663205] ? lock_downgrade+0x900/0x900 [ 2941.663226] ? check_preemption_disabled+0x48/0x280 [ 2941.669827] kobject: 'loop0' (00000000c87bda39): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2941.673682] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2941.673701] ? kasan_check_read+0x11/0x20 [ 2941.673717] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2941.673734] ? rcu_softirq_qs+0x20/0x20 [ 2941.673766] ? tun_get+0x22d/0x370 [ 2941.673783] ? tun_chr_close+0x180/0x180 [ 2941.673812] tun_chr_write_iter+0xb9/0x160 [ 2941.696749] kobject: 'loop5' (00000000e1bec0ea): kobject_uevent_env [ 2941.700870] do_iter_readv_writev+0x8b0/0xa80 [ 2941.700896] ? vfs_dedupe_file_range+0x700/0x700 [ 2941.700923] ? rw_verify_area+0x118/0x360 [ 2941.700945] do_iter_write+0x185/0x5f0 [ 2941.736781] kobject: 'loop5' (00000000e1bec0ea): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2941.737069] ? dup_iter+0x260/0x260 [ 2941.737102] vfs_writev+0x1f1/0x360 [ 2941.737128] ? vfs_iter_write+0xb0/0xb0 [ 2941.770580] ? lock_release+0xa00/0xa00 [ 2941.774576] ? perf_trace_sched_process_exec+0x860/0x860 [ 2941.780049] ? trace_hardirqs_off_caller+0x310/0x310 [ 2941.785191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2941.790747] ? __fdget_pos+0xde/0x200 [ 2941.794594] ? __fdget_raw+0x20/0x20 [ 2941.798339] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2941.803901] ? put_timespec64+0x10f/0x1b0 [ 2941.808076] do_writev+0x11a/0x310 [ 2941.811637] ? vfs_writev+0x360/0x360 [ 2941.815454] ? trace_hardirqs_off_caller+0x310/0x310 [ 2941.820592] __x64_sys_writev+0x75/0xb0 [ 2941.824586] do_syscall_64+0x1b9/0x820 [ 2941.828493] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2941.833888] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2941.838895] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2941.843772] ? trace_hardirqs_on_caller+0x310/0x310 [ 2941.848816] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2941.853880] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2941.858928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2941.863800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2941.868888] kobject: 'loop5' (00000000e1bec0ea): kobject_uevent_env [ 2941.869027] RIP: 0033:0x457521 [ 2941.878639] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 2941.880476] kobject: 'loop5' (00000000e1bec0ea): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2941.897571] RSP: 002b:00007fe43ce54ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 2941.897588] RAX: ffffffffffffffda RBX: 000000000000002a RCX: 0000000000457521 [ 2941.897615] RDX: 0000000000000001 RSI: 00007fe43ce54bf0 RDI: 00000000000000f0 [ 2941.897625] RBP: 0000000020000640 R08: 00000000000000f0 R09: 0000000000000000 [ 2941.897651] R10: 0000000000000000 R11: 0000000000000293 R12: 00007fe43ce556d4 [ 2941.897662] R13: 00000000004c537d R14: 00000000004d9890 R15: 00000000ffffffff [ 2941.908196] Kernel Offset: disabled [ 2941.955824] Rebooting in 86400 seconds..