0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3129.690131][T32380] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3129.702731][T32378] IPVS: ftp: loaded support on port[0] = 21 01:38:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x2, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:38:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x0, 0x0}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x3, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) [ 3129.928290][T32392] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3130.011322][T32382] IPVS: ftp: loaded support on port[0] = 21 [ 3130.169891][T32406] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:05 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x0, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:05 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x23, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) 01:38:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x60, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3130.520259][T32417] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3130.526837][T32413] IPVS: ftp: loaded support on port[0] = 21 [ 3130.759842][T32419] IPVS: ftp: loaded support on port[0] = 21 01:38:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x0, 0x0}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff\xff\xfe', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x300, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) [ 3130.881688][T32435] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:06 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3131.034487][T32443] IPVS: ftp: loaded support on port[0] = 21 01:38:06 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0x0, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x2300, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:38:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:06 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3131.431353][T32454] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3131.444746][T32449] IPVS: ftp: loaded support on port[0] = 21 01:38:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x6000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3131.638135][T32457] IPVS: ftp: loaded support on port[0] = 21 01:38:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x0, 0x0}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0xff00, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:07 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3131.794691][T32476] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3131.803884][T32474] IPVS: ftp: loaded support on port[0] = 21 01:38:07 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0x0, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:38:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x1000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:07 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:38:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x2000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3132.197401][T32494] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3132.230180][T32491] IPVS: ftp: loaded support on port[0] = 21 [ 3132.463964][T32496] IPVS: ftp: loaded support on port[0] = 21 01:38:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:38:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x3000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:08 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x0, &(0x7f00006dc000)}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3132.742318][T32513] IPVS: ftp: loaded support on port[0] = 21 01:38:08 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0x0, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x7fffffe, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:38:08 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:38:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x23000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3133.058529][T32533] IPVS: ftp: loaded support on port[0] = 21 01:38:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x60000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3133.352004][T32532] IPVS: ftp: loaded support on port[0] = 21 01:38:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x0, &(0x7f00006dc000)}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0xfeffff07, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:38:11 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:11 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x0, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x0, &(0x7f00006dc000)}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3136.289670][T32571] audit_tg_check: 4 callbacks suppressed [ 3136.289680][T32571] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3136.294079][T32564] IPVS: ftp: loaded support on port[0] = 21 01:38:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:38:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0xff000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3136.515801][T32583] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x100000000000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3136.592961][T32573] IPVS: ftp: loaded support on port[0] = 21 01:38:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:38:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x200000000000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3136.730037][T32594] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:14 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:38:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x300000000000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x0, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:14 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x0, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) [ 3138.780525][T32616] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x2300000000000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:38:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x6000000000000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3138.959988][T32609] IPVS: ftp: loaded support on port[0] = 21 [ 3138.976832][T32626] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3138.980232][T32615] IPVS: ftp: loaded support on port[0] = 21 01:38:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3139.175523][T32635] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:17 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0xfeffff0700000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x0, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:17 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x0, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3142.258342][T32644] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0xff00000000000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:38:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:38:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0xffffffff00000000, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3142.470192][T32649] IPVS: ftp: loaded support on port[0] = 21 [ 3142.474523][T32665] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3142.599876][T32657] IPVS: ftp: loaded support on port[0] = 21 [ 3142.719893][T32676] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:18 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:38:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x2, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x0, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:18 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x0, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3143.158544][T32686] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:38:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x3, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3143.343422][T32684] IPVS: ftp: loaded support on port[0] = 21 [ 3143.351821][T32689] IPVS: ftp: loaded support on port[0] = 21 [ 3143.352188][T32699] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x23, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) 01:38:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3143.589564][T32712] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:38:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x60, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:19 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3144.017834][T32718] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3144.283548][T32725] IPVS: ftp: loaded support on port[0] = 21 01:38:21 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x0, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x300, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:21 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) unshare(0x40000000) 01:38:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3146.055486][T32750] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x2300, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:38:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x6000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) [ 3146.385037][T32767] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3146.402229][T32742] IPVS: ftp: loaded support on port[0] = 21 [ 3146.444808][T32752] IPVS: ftp: loaded support on port[0] = 21 01:38:22 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x0, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0xff00, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3146.977564][ T317] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3147.156486][ T319] IPVS: ftp: loaded support on port[0] = 21 01:38:24 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) unshare(0x40000000) 01:38:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:38:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x1000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:24 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x0, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3148.963979][ T330] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x2000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) [ 3149.096196][ T343] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x3000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) [ 3149.223101][ T331] IPVS: ftp: loaded support on port[0] = 21 [ 3149.263153][ T352] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3149.374464][ T338] IPVS: ftp: loaded support on port[0] = 21 01:38:27 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) unshare(0x40000000) 01:38:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:38:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x7fffffe, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3151.979820][ T367] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3152.144248][ T373] IPVS: ftp: loaded support on port[0] = 21 01:38:27 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x0, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x23000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:27 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff]}) unshare(0x40000000) 01:38:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x60000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3152.478656][ T389] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:38:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0xfeffff07, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3152.698472][ T384] IPVS: ftp: loaded support on port[0] = 21 [ 3152.737595][ T391] IPVS: ftp: loaded support on port[0] = 21 [ 3152.756861][ T404] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:28 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x0, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0xff000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3153.395510][ T421] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3153.605714][ T424] IPVS: ftp: loaded support on port[0] = 21 01:38:30 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff]}) unshare(0x40000000) 01:38:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x100000000000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:38:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:30 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x0, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x200000000000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3155.263255][ T435] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:38:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x300000000000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) [ 3155.559943][ T455] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3155.567307][ T440] IPVS: ftp: loaded support on port[0] = 21 [ 3155.582547][ T443] IPVS: ftp: loaded support on port[0] = 21 01:38:31 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff]}) unshare(0x40000000) 01:38:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, 0x0, 0x0) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x2300000000000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:38:31 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x0, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3156.240658][ T469] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x6000000000000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, 0x0, 0x0) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0xfeffff0700000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3156.547040][ T478] IPVS: ftp: loaded support on port[0] = 21 [ 3156.549333][ T491] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3156.601382][ T475] IPVS: ftp: loaded support on port[0] = 21 01:38:35 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0x0, 0x0, 0x8]}) unshare(0x40000000) 01:38:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, 0x0, 0x0) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0xff00000000000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:38:35 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x0, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3159.881423][ T508] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:38:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0xffffffff00000000, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3160.090483][ T522] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) [ 3160.151308][ T512] IPVS: ftp: loaded support on port[0] = 21 [ 3160.166770][ T514] IPVS: ftp: loaded support on port[0] = 21 01:38:38 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0x0, 0x0, 0x8]}) unshare(0x40000000) 01:38:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) 01:38:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3162.590577][ T542] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3162.778503][ T549] IPVS: ftp: loaded support on port[0] = 21 01:38:38 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(0xffffffffffffffff, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:38:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:38 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0x0, 0x0, 0x8]}) unshare(0x40000000) [ 3163.049230][ T561] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(0xffffffffffffffff, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3163.286355][ T563] IPVS: ftp: loaded support on port[0] = 21 [ 3163.366811][ T582] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3163.390250][ T566] IPVS: ftp: loaded support on port[0] = 21 01:38:39 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(0xffffffffffffffff, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3163.944325][ T595] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3164.162921][ T599] IPVS: ftp: loaded support on port[0] = 21 01:38:41 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x0, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:41 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3165.938574][ T615] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:38:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3166.158393][ T616] IPVS: ftp: loaded support on port[0] = 21 [ 3166.167143][ T629] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3166.204763][ T617] IPVS: ftp: loaded support on port[0] = 21 01:38:43 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x0, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:38:43 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x0, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) [ 3168.450255][ T650] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(0xffffffffffffffff, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3168.592424][ T645] IPVS: ftp: loaded support on port[0] = 21 01:38:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3168.737167][ T653] IPVS: ftp: loaded support on port[0] = 21 [ 3168.747010][ T668] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:46 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x0, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\xfe\xff\xff\a\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(0xffffffffffffffff, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:46 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x0, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3171.450925][ T688] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:38:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3171.508298][ T688] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3171.585186][ T686] IPVS: ftp: loaded support on port[0] = 21 01:38:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:38:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3171.676691][ T692] IPVS: ftp: loaded support on port[0] = 21 [ 3171.684147][ T704] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3171.818654][ T712] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:47 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x0, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:38:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(0xffffffffffffffff, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:47 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x0, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) [ 3172.266546][ T722] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) [ 3172.418989][ T724] IPVS: ftp: loaded support on port[0] = 21 01:38:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3172.479399][ T742] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) [ 3172.582006][ T729] IPVS: ftp: loaded support on port[0] = 21 01:38:48 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x0, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3172.706887][ T754] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3172.979523][ T759] IPVS: ftp: loaded support on port[0] = 21 01:38:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:50 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x0, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:50 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x0, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:38:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3175.049246][ T785] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3175.139696][ T791] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:38:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3175.307414][ T786] IPVS: ftp: loaded support on port[0] = 21 [ 3175.311447][ T778] IPVS: ftp: loaded support on port[0] = 21 [ 3175.388804][ T804] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:53 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x0, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:38:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3178.246245][ T812] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:53 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x0, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:38:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3178.393014][ T819] IPVS: ftp: loaded support on port[0] = 21 [ 3178.457235][ T827] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) 01:38:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3178.683631][ T844] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3178.789976][ T833] IPVS: ftp: loaded support on port[0] = 21 01:38:54 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x0, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:38:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3179.103010][ T852] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:54 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x0, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3179.338524][ T856] IPVS: ftp: loaded support on port[0] = 21 01:38:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3179.411238][ T869] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3179.667829][ T883] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3179.767635][ T871] IPVS: ftp: loaded support on port[0] = 21 01:38:57 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x0, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:38:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:57 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x0, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3181.833116][ T896] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:38:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3182.023094][ T910] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:38:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3182.074540][ T894] IPVS: ftp: loaded support on port[0] = 21 [ 3182.095738][ T900] IPVS: ftp: loaded support on port[0] = 21 01:38:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3182.243341][ T920] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:59 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x0, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:38:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:38:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:38:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:38:59 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x0, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3184.253544][ T935] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:38:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:38:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:38:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3184.408344][ T929] IPVS: ftp: loaded support on port[0] = 21 01:38:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:39:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3184.492906][ T937] IPVS: ftp: loaded support on port[0] = 21 [ 3184.505882][ T949] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3184.762495][ T960] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:00 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x0, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:39:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58", 0x41, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3185.158907][ T969] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3185.360608][ T973] IPVS: ftp: loaded support on port[0] = 21 01:39:02 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x0, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58", 0x41, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:02 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x0, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3187.057331][ T990] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:39:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\xfe\xff\xff\a\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3187.281166][ T1002] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3187.292188][ T986] IPVS: ftp: loaded support on port[0] = 21 01:39:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3187.362674][ T992] IPVS: ftp: loaded support on port[0] = 21 01:39:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3187.557311][ T1012] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:05 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x0, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:39:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58", 0x41, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:05 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x0, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) [ 3190.224981][ T1027] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c", 0x62, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3190.386967][ T1022] IPVS: ftp: loaded support on port[0] = 21 01:39:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) [ 3190.450803][ T1029] IPVS: ftp: loaded support on port[0] = 21 [ 3190.469187][ T1040] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:06 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x0, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:39:06 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x0, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3190.989413][ T1070] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3191.164862][ T1081] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3191.259253][ T1075] IPVS: ftp: loaded support on port[0] = 21 [ 3191.263270][ T1074] IPVS: ftp: loaded support on port[0] = 21 01:39:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c", 0x62, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3191.414881][ T1093] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:10 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x0, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:39:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c", 0x62, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:10 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x0, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3194.692358][ T1108] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:39:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:39:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3194.894702][ T1122] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3194.930926][ T1106] IPVS: ftp: loaded support on port[0] = 21 [ 3194.996414][ T1114] IPVS: ftp: loaded support on port[0] = 21 01:39:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3195.183109][ T1137] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:11 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x0, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:39:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c", 0x72, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:11 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x0, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3195.621086][ T1146] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) 01:39:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3195.877249][ T1163] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3195.882926][ T1153] IPVS: ftp: loaded support on port[0] = 21 01:39:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3195.953427][ T1151] IPVS: ftp: loaded support on port[0] = 21 01:39:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:14 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x0, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c", 0x72, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3199.188270][ T1191] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3199.402623][ T1195] IPVS: ftp: loaded support on port[0] = 21 01:39:15 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x0, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:39:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3199.755122][ T1206] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:39:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3200.040465][ T1218] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:15 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x0, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c", 0x72, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3200.216022][ T1208] IPVS: ftp: loaded support on port[0] = 21 [ 3200.322631][ T1235] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3200.445560][ T1230] IPVS: ftp: loaded support on port[0] = 21 01:39:16 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0x0, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:39:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3200.670970][ T1240] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3200.875494][ T1254] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3201.043171][ T1246] IPVS: ftp: loaded support on port[0] = 21 01:39:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:39:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:18 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x0, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c0000000000000000", 0x7a, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:18 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0x0, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3202.613887][ T1263] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:39:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff\xff', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3202.827243][ T1265] IPVS: ftp: loaded support on port[0] = 21 [ 3202.854009][ T1282] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3202.972346][ T1272] IPVS: ftp: loaded support on port[0] = 21 01:39:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\xfe\xff\xff\a\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:39:19 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0x0, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3203.598979][ T1310] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3203.740308][ T1313] IPVS: ftp: loaded support on port[0] = 21 01:39:20 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0x0, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:39:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c0000000000000000", 0x7a, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:20 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0x0, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3205.290883][ T1321] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:39:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) [ 3205.569806][ T1327] IPVS: ftp: loaded support on port[0] = 21 [ 3205.570471][ T1338] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3205.604175][ T1328] IPVS: ftp: loaded support on port[0] = 21 01:39:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:24 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:39:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c0000000000000000", 0x7a, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:24 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0x0, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) [ 3208.598262][ T1361] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3208.777324][ T1362] IPVS: ftp: loaded support on port[0] = 21 [ 3208.799224][ T1365] IPVS: ftp: loaded support on port[0] = 21 01:39:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3208.878948][ T1375] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:24 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3209.355520][ T1390] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:24 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x0, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/126, 0x7e, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:39:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) [ 3209.598694][ T1412] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/126, 0x7e, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3209.670590][ T1397] IPVS: ftp: loaded support on port[0] = 21 [ 3209.820357][ T1399] IPVS: ftp: loaded support on port[0] = 21 01:39:27 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:27 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x0, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:39:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/126, 0x7e, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) [ 3211.929996][ T1436] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3212.169354][ T1450] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3212.174357][ T1440] IPVS: ftp: loaded support on port[0] = 21 [ 3212.192140][ T1438] IPVS: ftp: loaded support on port[0] = 21 01:39:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3212.397576][ T1461] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:28 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) [ 3213.014942][ T1470] IPVS: ftp: loaded support on port[0] = 21 01:39:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/128, 0x80, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:30 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x0, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:39:30 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3214.743692][ T1479] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:39:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3214.905730][ T1494] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3215.002121][ T1481] IPVS: ftp: loaded support on port[0] = 21 01:39:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) [ 3215.067398][ T1486] IPVS: ftp: loaded support on port[0] = 21 [ 3215.132984][ T1503] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/128, 0x80, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3215.596073][ T1510] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:33 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x0, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3217.985661][ T1524] IPVS: ftp: loaded support on port[0] = 21 01:39:33 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/128, 0x80, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:39:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3218.104494][ T1534] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:39:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3218.301657][ T1537] IPVS: ftp: loaded support on port[0] = 21 [ 3218.305838][ T1545] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3218.486504][ T1556] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:34 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x0, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3218.820245][ T1573] IPVS: ftp: loaded support on port[0] = 21 01:39:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:39:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:34 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/129, 0x81, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3219.001050][ T1577] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\xfe\xff\xff\a\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:39:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3219.251412][ T1596] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3219.344610][ T1586] IPVS: ftp: loaded support on port[0] = 21 01:39:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:39:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:36 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x0, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/129, 0x81, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:36 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x0, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3221.403717][ T1615] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:39:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3221.604466][ T1611] IPVS: ftp: loaded support on port[0] = 21 01:39:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3221.653327][ T1630] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3221.712240][ T1620] IPVS: ftp: loaded support on port[0] = 21 01:39:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:39:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3221.950096][ T1646] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:37 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x0, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3222.430942][ T1657] IPVS: ftp: loaded support on port[0] = 21 01:39:39 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x0, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:39:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/129, 0x81, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:39 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x0, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3224.176270][ T1668] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:39:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:39:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3224.403399][ T1666] IPVS: ftp: loaded support on port[0] = 21 [ 3224.414531][ T1681] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3224.489566][ T1671] IPVS: ftp: loaded support on port[0] = 21 01:39:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3224.646861][ T1692] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:40 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x0, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3225.081680][ T1701] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3225.284175][ T1704] IPVS: ftp: loaded support on port[0] = 21 01:39:42 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x0, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:39:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:42 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x0, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3227.190004][ T1721] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:39:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3227.367186][ T1720] IPVS: ftp: loaded support on port[0] = 21 01:39:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3227.460284][ T1724] IPVS: ftp: loaded support on port[0] = 21 [ 3227.506664][ T1742] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:43 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x0, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:39:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3228.084269][ T1753] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3228.263032][ T1760] IPVS: ftp: loaded support on port[0] = 21 01:39:45 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x0, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) 01:39:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:45 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x0, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3230.017148][ T1770] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:39:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) [ 3230.191750][ T1771] IPVS: ftp: loaded support on port[0] = 21 01:39:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3230.293398][ T1790] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3230.311644][ T1779] IPVS: ftp: loaded support on port[0] = 21 01:39:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:46 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x0, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3230.887415][ T1809] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3231.056735][ T1815] IPVS: ftp: loaded support on port[0] = 21 01:39:48 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x0, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:39:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:48 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x0) 01:39:48 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x0) [ 3232.978435][ T1826] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:39:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3233.194136][ T1848] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3233.218076][ T1835] IPVS: ftp: loaded support on port[0] = 21 01:39:49 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:49 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x0) 01:39:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:39:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:39:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) [ 3233.880588][ T1870] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYBLOB="090001000000b3ebc168485c0a9355c74ff7681961426dae2a4524d55677c792110a18784ebc007c4e35d89c735e95ecb75d168d9ec1f75737e5023fb851b68d082403b604c16b3399801dcbe81a795d20aaa8dbab15cbc5d420e75285141cf99659c5802622b3b7abc96d1d679bb69fe4a1d81633b4af1673a6383fbe8c2304f200dfb0601986d36c4c99715bcfb7aea844c4411e5e4ed423333387b0da"], 0x1) 01:39:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:39:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\xfe\xff\xff\a\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3234.112231][ T1885] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3234.162535][ T1872] IPVS: ftp: loaded support on port[0] = 21 01:39:50 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 01:39:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc69123c127b8e9bd070") r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000002d80)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x23, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 01:39:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3234.756606][ T1902] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3234.936316][ T1910] IPVS: ftp: loaded support on port[0] = 21 01:39:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:39:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000000000011000200000000000002"]) [ 3235.012556][ T1922] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:51 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 01:39:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:39:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") prlimit64(0x0, 0x9, &(0x7f0000000040), 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() io_setup(0xb170, &(0x7f00000000c0)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x26) wait4(0x0, 0x0, 0x0, 0x0) 01:39:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3235.614033][ T1944] ptrace attach of "/root/syz-executor.2"[1943] was attempted by "/root/syz-executor.2"[1944] [ 3235.635746][ T1948] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x20001, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000740)) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000001a7f1d150000000000000000000000000000e3f78213"], 0x1f) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 01:39:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:39:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3235.861196][ T1963] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3235.932393][ T1951] IPVS: ftp: loaded support on port[0] = 21 01:39:51 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x0, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 01:39:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x386}], 0xed, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00\x00/`\xd0\xa7\f?\xe6\x1f/\x19.|&!&\x1f=F5\x93\f\xf2\x97\xa3\x97I\x1f\xe2\xa6\x13@\xb3=\xb6\xb3\xf9\x00\x9aB\a\xfd\x87d\xe9\x90\x19 \xb25j#=\t\xca\xd4\xaf-7r%m)\xcf\xf1+~\xdc\xbf\x80\xe9\x91\xf8.\xdc\x81W\x00\xa8\xf1^}y\xbf\xeb\xca\xc3\x91\xb8k\xaf\xebP\xd1$\xbcoT*\xd9K\xf0;\xe9\xbf\x9b\x1d_ot\xab\x1eT\xdaP\xd0\xf9%\xb9\x13\xac)? ^\xba\xe9n\x98\x03K\xb5\x86\xc9\xec\xd5\xb4\xe9\x16\xbc\xa8IE\xe4') preadv(r0, &(0x7f0000000480), 0x1000000000000052, 0x0) 01:39:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:39:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) [ 3236.363367][ T1986] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:39:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3236.523802][ T2001] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:52 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3236.640511][ T1991] IPVS: ftp: loaded support on port[0] = 21 [ 3236.868348][ T2007] IPVS: ftp: loaded support on port[0] = 21 01:39:52 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x0, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 01:39:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3237.238282][ T2023] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3237.428324][ T2034] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:53 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3237.525578][ T2026] IPVS: ftp: loaded support on port[0] = 21 [ 3237.636584][ T2048] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3237.866736][ T2046] IPVS: ftp: loaded support on port[0] = 21 01:39:55 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x0, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:39:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 01:39:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:55 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x0, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) [ 3240.047139][ T2061] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) [ 3240.254893][ T2077] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3240.276878][ T2067] IPVS: ftp: loaded support on port[0] = 21 01:39:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) [ 3240.368929][ T2063] IPVS: ftp: loaded support on port[0] = 21 01:39:59 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x0, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:39:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:39:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:39:59 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x0, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:59 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x0, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:39:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3243.623717][ T2100] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:39:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:39:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3243.801072][ T2098] IPVS: ftp: loaded support on port[0] = 21 01:39:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3243.841387][ T2114] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3243.864095][ T2102] IPVS: ftp: loaded support on port[0] = 21 01:39:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:39:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3244.046007][ T2108] IPVS: ftp: loaded support on port[0] = 21 [ 3244.120337][ T2124] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:40:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:02 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x0, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3246.998093][ T2132] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3247.200952][ T2136] IPVS: ftp: loaded support on port[0] = 21 01:40:02 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x0, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:02 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3247.311504][ T2147] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:40:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:40:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3247.615023][ T2146] IPVS: ftp: loaded support on port[0] = 21 01:40:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) [ 3247.759306][ T2151] IPVS: ftp: loaded support on port[0] = 21 01:40:03 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x0, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3248.127131][ T2175] IPVS: ftp: loaded support on port[0] = 21 01:40:06 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x0, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3250.694940][ T2179] IPVS: ftp: loaded support on port[0] = 21 01:40:06 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:40:06 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x0, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:06 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3251.199515][ T2184] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:40:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) [ 3251.497647][ T2202] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3251.534943][ T2191] IPVS: ftp: loaded support on port[0] = 21 [ 3251.565202][ T2190] IPVS: ftp: loaded support on port[0] = 21 01:40:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3251.751689][ T2194] IPVS: ftp: loaded support on port[0] = 21 [ 3251.764638][ T2212] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:09 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:40:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:09 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x0, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:09 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3254.543684][ T2228] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3254.757147][ T2236] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3254.757215][ T2224] IPVS: ftp: loaded support on port[0] = 21 [ 3254.771166][ T2223] IPVS: ftp: loaded support on port[0] = 21 [ 3254.795730][ T2229] IPVS: ftp: loaded support on port[0] = 21 01:40:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3255.033661][ T2246] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:10 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xffffff67) unlink(&(0x7f0000000140)='./file0\x00') clone(0x200000100010a, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rmdir(&(0x7f0000000180)='./file1\x00') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4000000003a) creat(&(0x7f0000000000)='./file0\x00', 0x0) 01:40:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:40:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3255.507905][ T2256] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3255.664052][ T2265] ptrace attach of "/root/syz-executor.2"[2264] was attempted by "/root/syz-executor.2"[2265] 01:40:13 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x0, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3257.976617][ T2270] IPVS: ftp: loaded support on port[0] = 21 01:40:13 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:40:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:13 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000340)={0x8}, 0x0, 0x400) [ 3258.100998][ T2279] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 01:40:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:40:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:40:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3258.365849][ T2295] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3258.422198][ T2282] IPVS: ftp: loaded support on port[0] = 21 01:40:15 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x0, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x400000000000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14, 0x52}}}}]}, 0x48}}, 0x0) 01:40:15 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x3, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) [ 3260.475565][ T2315] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:40:16 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x3, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) 01:40:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:16 executing program 2: r0 = getpgrp(0xffffffffffffffff) sched_setaffinity(r0, 0x0, 0x0) 01:40:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3260.702331][ T2330] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3260.735660][ T2320] IPVS: ftp: loaded support on port[0] = 21 01:40:16 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x0, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:16 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x3, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) 01:40:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:16 executing program 2: prctl$PR_GET_TSC(0x19, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) 01:40:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) [ 3261.414654][ T2354] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:40:16 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x3, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) 01:40:17 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) unshare(0x400) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r0, r1}) 01:40:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:17 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x3, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) [ 3261.660323][ T2373] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3261.734949][ T2360] IPVS: ftp: loaded support on port[0] = 21 01:40:17 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x0, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) 01:40:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:17 executing program 1: syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x3, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) 01:40:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) r2 = syz_open_pts(r1, 0x0) r3 = syz_open_pts(r1, 0x0) poll(&(0x7f0000000640)=[{r3, 0x8002}, {0xffffffffffffffff, 0x1000}, {r0, 0x4000}, {r3, 0x2}, {0xffffffffffffffff, 0x1010}, {r2}, {r1}], 0x7, 0x3) [ 3262.325886][ T2391] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:17 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 01:40:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:40:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:18 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) read(r2, 0x0, 0x82) tkill(r0, 0x1004000000016) 01:40:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3262.572505][ T2410] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3262.608517][ T2397] IPVS: ftp: loaded support on port[0] = 21 01:40:18 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x0, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:18 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 01:40:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:40:18 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) [ 3263.048857][ T2427] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:40:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3263.286726][ T2447] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3263.327598][ T2436] IPVS: ftp: loaded support on port[0] = 21 01:40:18 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$mouse(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) read(r2, 0x0, 0x82) tkill(r0, 0x1004000000016) 01:40:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:19 executing program 1: syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x3, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) 01:40:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:19 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x0, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:19 executing program 1: syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x3, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) [ 3263.695862][ T2464] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:40:19 executing program 1: syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x3, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) [ 3263.884445][ T2482] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3263.962632][ T2470] IPVS: ftp: loaded support on port[0] = 21 01:40:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x4000000, 0x182) r2 = memfd_create(&(0x7f0000000000)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x2000005) 01:40:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:40:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:19 executing program 1: syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) [ 3264.427060][ T2499] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:20 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x0, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:40:20 executing program 1: syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) 01:40:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3264.654950][ T2516] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:40:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3264.724360][ T2516] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:20 executing program 1: syz_emit_ethernet(0x9c, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x4, 0x880b, 0x6}}}}}}, 0x0) 01:40:20 executing program 2: r0 = socket$inet(0x2, 0x80801, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) recvmmsg(r0, &(0x7f00000000c0), 0xa5c0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 01:40:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:40:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3264.909098][ T2519] IPVS: ftp: loaded support on port[0] = 21 [ 3264.943149][ T2540] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:21 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0x0, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:21 executing program 1: 01:40:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:21 executing program 2: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x5, &(0x7f00000000c0)={0x1}) [ 3265.556013][ T2559] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:21 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) socket(0x100000000a, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$caif_stream(0x25, 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 01:40:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:40:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000500), 0xffd2}], 0x1}}], 0x469, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 01:40:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3265.832488][ T2585] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3265.890747][ T2585] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3265.909622][ T2568] IPVS: ftp: loaded support on port[0] = 21 01:40:21 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0x0, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:21 executing program 1: prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x37ffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) socket$l2tp(0x18, 0x1, 0x1) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) socket$vsock_stream(0x28, 0x1, 0x0) 01:40:21 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000)={{0x5}}, 0x10) 01:40:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:40:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:21 executing program 2: 01:40:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:40:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:22 executing program 2: [ 3266.712822][ T2606] IPVS: ftp: loaded support on port[0] = 21 01:40:22 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0x0, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:22 executing program 1: 01:40:22 executing program 2: 01:40:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:40:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:22 executing program 1: 01:40:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:40:22 executing program 2: 01:40:22 executing program 1: [ 3267.426389][ T2642] IPVS: ftp: loaded support on port[0] = 21 01:40:23 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:23 executing program 2: 01:40:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:40:23 executing program 1: 01:40:23 executing program 1: 01:40:23 executing program 2: 01:40:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:23 executing program 2: [ 3267.937376][ T2674] IPVS: ftp: loaded support on port[0] = 21 01:40:23 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:23 executing program 1: clone(0x7ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') exit(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") preadv(r0, &(0x7f00000013c0), 0x1e3, 0x0) 01:40:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:40:23 executing program 2: 01:40:23 executing program 2: 01:40:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:40:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:23 executing program 1: [ 3268.397041][ T2725] audit_tg_check: 7 callbacks suppressed [ 3268.397050][ T2725] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3268.431469][ T2712] IPVS: ftp: loaded support on port[0] = 21 01:40:23 executing program 2: 01:40:24 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:40:24 executing program 2: 01:40:24 executing program 1: 01:40:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:24 executing program 1: 01:40:24 executing program 2: [ 3269.129913][ T2744] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:40:24 executing program 1: 01:40:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3269.321816][ T2746] IPVS: ftp: loaded support on port[0] = 21 [ 3269.429422][ T2763] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:25 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:25 executing program 2: 01:40:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) 01:40:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:25 executing program 1: 01:40:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:25 executing program 2: 01:40:25 executing program 1: [ 3269.929502][ T2773] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:40:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:25 executing program 2: [ 3270.172559][ T2793] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3270.209417][ T2778] IPVS: ftp: loaded support on port[0] = 21 01:40:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:26 executing program 1: 01:40:26 executing program 2: 01:40:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:26 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:26 executing program 1: [ 3270.755706][ T2807] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:40:26 executing program 2: 01:40:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:26 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) 01:40:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:40:26 executing program 2: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) pkey_free(0xffffffffffffffff) 01:40:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3271.015746][ T2823] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3271.063326][ T2810] IPVS: ftp: loaded support on port[0] = 21 01:40:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:27 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0x0, @in6, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 01:40:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:27 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 01:40:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3271.575729][ T2848] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:27 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:27 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:40:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3271.761873][ T2873] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3271.907307][ T2860] IPVS: ftp: loaded support on port[0] = 21 [ 3271.985858][ T2869] IPVS: ftp: loaded support on port[0] = 21 [ 3272.032716][ T2871] IPVS: ftp: loaded support on port[0] = 21 01:40:30 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:40:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:30 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:30 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3274.987391][ T2890] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:40:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3275.143489][ T2891] IPVS: ftp: loaded support on port[0] = 21 [ 3275.193167][ T2903] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) [ 3275.252848][ T2896] IPVS: ftp: loaded support on port[0] = 21 01:40:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3275.341179][ T2893] IPVS: ftp: loaded support on port[0] = 21 [ 3275.470199][ T2915] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:34 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:40:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:34 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:34 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3279.109526][ T2922] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3279.345415][ T2942] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) [ 3279.400554][ T2925] IPVS: ftp: loaded support on port[0] = 21 [ 3279.430774][ T2930] IPVS: ftp: loaded support on port[0] = 21 01:40:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3279.452702][ T2934] IPVS: ftp: loaded support on port[0] = 21 [ 3279.584568][ T2951] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:38 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:40:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:38 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) unshare(0x40000000) 01:40:38 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x0, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3282.656126][ T2961] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:40:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3282.891469][ T2978] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3282.936035][ T2966] IPVS: ftp: loaded support on port[0] = 21 [ 3282.953097][ T2968] IPVS: ftp: loaded support on port[0] = 21 01:40:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) [ 3282.990255][ T2969] IPVS: ftp: loaded support on port[0] = 21 01:40:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3283.172532][ T2987] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:41 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x0, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:40:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:41 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) unshare(0x40000000) 01:40:41 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x0, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3286.219760][ T2999] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:40:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3286.402597][ T3014] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3286.532530][ T3004] IPVS: ftp: loaded support on port[0] = 21 [ 3286.552598][ T3005] IPVS: ftp: loaded support on port[0] = 21 [ 3286.612218][ T3003] IPVS: ftp: loaded support on port[0] = 21 [ 3286.634850][ T3024] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:45 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x0, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:45 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x0, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:45 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) unshare(0x40000000) [ 3289.925802][ T3036] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:40:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3290.167612][ T3039] IPVS: ftp: loaded support on port[0] = 21 01:40:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3290.263065][ T3030] IPVS: ftp: loaded support on port[0] = 21 [ 3290.292331][ T3041] IPVS: ftp: loaded support on port[0] = 21 [ 3290.458236][ T3049] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:40:49 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x0, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:40:49 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:49 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) unshare(0x40000000) [ 3293.586522][ T3070] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:40:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) [ 3293.784047][ T3071] IPVS: ftp: loaded support on port[0] = 21 [ 3293.802603][ T3077] IPVS: ftp: loaded support on port[0] = 21 [ 3293.874093][ T3096] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3294.014286][ T3084] IPVS: ftp: loaded support on port[0] = 21 [ 3294.089644][ T3108] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:49 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x0, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:40:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3294.517274][ T3119] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3294.664157][ T3121] IPVS: ftp: loaded support on port[0] = 21 01:40:52 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3296.820413][ T3129] IPVS: ftp: loaded support on port[0] = 21 01:40:52 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x0, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:52 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x0, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:52 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3297.282007][ T3142] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:40:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3297.551170][ T3138] IPVS: ftp: loaded support on port[0] = 21 [ 3297.559430][ T3146] IPVS: ftp: loaded support on port[0] = 21 01:40:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3297.611918][ T3141] IPVS: ftp: loaded support on port[0] = 21 01:40:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3297.860085][ T3176] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:53 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x0, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:40:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3298.214144][ T3183] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3298.351900][ T3189] IPVS: ftp: loaded support on port[0] = 21 01:40:56 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x0, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:40:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:40:56 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x0, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:40:56 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3301.045923][ T3199] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:40:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:40:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3301.273111][ T3221] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:40:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3301.341503][ T3209] IPVS: ftp: loaded support on port[0] = 21 01:40:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) [ 3301.398548][ T3211] IPVS: ftp: loaded support on port[0] = 21 01:40:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3301.480969][ T3208] IPVS: ftp: loaded support on port[0] = 21 [ 3301.520042][ T3234] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:00 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x0) 01:41:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:41:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:00 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:00 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3305.122880][ T3250] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:41:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:00 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x0) 01:41:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:41:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3305.369947][ T3277] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:00 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x0) [ 3305.441896][ T3258] IPVS: ftp: loaded support on port[0] = 21 01:41:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) [ 3305.567353][ T3261] IPVS: ftp: loaded support on port[0] = 21 [ 3305.672599][ T3294] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:01 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x0, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3306.093020][ T3308] IPVS: ftp: loaded support on port[0] = 21 01:41:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:03 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0x0, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:03 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:41:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:03 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x0, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3307.594054][ T3311] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:41:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) [ 3307.855744][ T3313] IPVS: ftp: loaded support on port[0] = 21 [ 3307.873109][ T3316] IPVS: ftp: loaded support on port[0] = 21 [ 3307.883546][ T3338] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3307.933445][ T3323] IPVS: ftp: loaded support on port[0] = 21 01:41:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) [ 3308.162436][ T3349] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:04 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0x0, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3308.670835][ T3356] IPVS: ftp: loaded support on port[0] = 21 01:41:06 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:41:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:06 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x0, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:06 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x0, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3310.961924][ T3367] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3311.042373][ T3371] IPVS: ftp: loaded support on port[0] = 21 01:41:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3311.101890][ T3363] IPVS: ftp: loaded support on port[0] = 21 01:41:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:41:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3311.249040][ T3381] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3311.281137][ T3368] IPVS: ftp: loaded support on port[0] = 21 01:41:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:41:06 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3311.584388][ T3398] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3311.593039][ T3395] IPVS: ftp: loaded support on port[0] = 21 01:41:09 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x0, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:09 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x0, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:41:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:09 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:41:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3314.187245][ T3413] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3314.215001][ T3410] IPVS: ftp: loaded support on port[0] = 21 01:41:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3314.385534][ T3426] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) [ 3314.426907][ T3416] IPVS: ftp: loaded support on port[0] = 21 [ 3314.440264][ T3419] IPVS: ftp: loaded support on port[0] = 21 01:41:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3314.606836][ T3438] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:12 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x0, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3317.335323][ T3445] IPVS: ftp: loaded support on port[0] = 21 01:41:13 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x0, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:41:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:13 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socket(0x0, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x10000) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000001c0)) 01:41:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$alg(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@nfc, 0x80, 0x0}, 0x0) [ 3318.001400][ T3457] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:41:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3318.253863][ T3453] IPVS: ftp: loaded support on port[0] = 21 01:41:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3318.314576][ T3477] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3318.420028][ T3465] IPVS: ftp: loaded support on port[0] = 21 01:41:14 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001b40)='t\bnu\x00\x00\x00\x7f\x00\x00\x8c\x00\x10\x00\x00\x00\x00\x00\x00N\x1c\xc3\xfe\xc3.\x12\x1e\xcc\xf2\xd8\xd5l\x04~K8\xff\xe1S\xfa\xc1\xbb\x8bx\x9e\v\x83\xf6\xb2q[\xfd\xd8\x8b\x1d7\xcc\xe9\x82\xe8Y\xda\xec\x02sh5\x8d\x90J\xd0v\tu@\x13\x94\xd3\xe2\x8d\xec\x914\xcaKy\xe9K\x9cP\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa1\xff\x96\xec\xf8\xcaJH\xef\xfc\n.}\x0fnvI\x83\xa5\xfc\xd3\xe4(\xa7&\xab\xd2\xd5\x90\x87\xea\xddO\x1f\xff\x00\x00\x00\xdd\xb1\xc6\xae\x0f\xb6\xfcEq\xc3\xe6p\x95\xc7x\x91\x9c\xf4\x10W\xfd\xea\xb3|\xa1\xb0M\x06C\xf1\xb5\xc3\x8a\xaf\x1b\x98\xc9c6\x13\xa6\x94\x14', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, "7001e0f57c8cf6270b24e415e93e42aae51d871554c11cd59cc80000000025bad6b399778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d510255faf7f404000300daa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) 01:41:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) socket$tipc(0x1e, 0x2, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 01:41:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:41:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x800000000043) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="b1b78aa1"], 0x4) [ 3320.445734][ T3503] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:41:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) 01:41:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x800000000043) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'\x91[Q\xe7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x1132}) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x6, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) write$cgroup_subtree(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="b1b78aa174ea"], 0x6) 01:41:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3320.726329][ T3510] IPVS: ftp: loaded support on port[0] = 21 [ 3320.746083][ T3529] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:41:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0xfffffffffffffffd, 0x800040000000) fcntl$setflags(r0, 0x2, 0x1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000001c0)={0x0, 0x1, 0x81, 0x4}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='projid_map\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$security_evm(r1, &(0x7f0000000040)='security.evm\x00', &(0x7f00000000c0)=@v2={0x5, 0x1, 0xa, 0x8, 0x2a, "5c1a8b2ee6fefe54ed610795c319ec6435b4cc1e4077ae2e50dc6bdf87295358bad29c7d9368e0110be4"}, 0x34, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8, 0x2, 0x0, 0x2, 0x8000, 0xfffffffffffffffd}, 0x20) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000100)=0x6, 0x4) sendmsg$nl_generic(r2, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000140)={0x28, 0x4000000000017, 0x101, 0x0, 0x0, {0x4}, [@typed={0x14, 0xc, @ipv6=@empty}]}, 0x28}}, 0x0) 01:41:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, 0x0) connect$vsock_dgram(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f00000002c0)) 01:41:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3321.371901][ T3547] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:41:16 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$P9_RLINK(r0, 0x0, 0x0) 01:41:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x400000000000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14, 0x52}}}}]}, 0x48}}, 0x0) [ 3321.546460][ T3563] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3321.606859][ T3550] IPVS: ftp: loaded support on port[0] = 21 01:41:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:41:17 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:41:17 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xffffff67) unlink(&(0x7f0000000140)='./file0\x00') clone(0x200000100010a, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file1\x00') rmdir(&(0x7f0000000180)='./file1\x00') 01:41:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x7e}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x35}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 3322.205525][ T3580] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:41:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:17 executing program 2: [ 3322.274279][ T3580] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3322.291482][ T3591] IPVS: ftp: loaded support on port[0] = 21 01:41:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:17 executing program 2: 01:41:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) [ 3322.533523][ T3611] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:18 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:18 executing program 0: 01:41:18 executing program 2: 01:41:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:41:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:18 executing program 0: 01:41:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:18 executing program 2: [ 3322.762772][ T3624] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3322.784773][ T3628] IPVS: ftp: loaded support on port[0] = 21 01:41:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:41:18 executing program 0: 01:41:18 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:41:18 executing program 2: 01:41:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:18 executing program 0: [ 3323.122531][ T3654] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:18 executing program 0: 01:41:18 executing program 2: [ 3323.164004][ T3657] IPVS: ftp: loaded support on port[0] = 21 01:41:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:41:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:18 executing program 0: [ 3323.365341][ T3669] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:19 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:19 executing program 2: 01:41:19 executing program 0: 01:41:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:41:19 executing program 2: 01:41:19 executing program 0: [ 3323.602133][ T3692] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:41:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:19 executing program 2: [ 3323.703742][ T3695] IPVS: ftp: loaded support on port[0] = 21 [ 3323.814146][ T3709] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:19 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:19 executing program 2: 01:41:19 executing program 0: 01:41:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:41:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:19 executing program 2: [ 3324.048389][ T3719] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:19 executing program 0: 01:41:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) [ 3324.202707][ T3728] IPVS: ftp: loaded support on port[0] = 21 01:41:19 executing program 2: [ 3324.264042][ T3736] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:19 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:19 executing program 0: 01:41:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:41:19 executing program 2: 01:41:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3324.526970][ T3752] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:20 executing program 2: 01:41:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:20 executing program 0: 01:41:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3324.617118][ T3757] IPVS: ftp: loaded support on port[0] = 21 01:41:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3324.729115][ T3769] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:20 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:20 executing program 2: socket$kcm(0x2, 0x200000000000001, 0x0) prlimit64(0x0, 0x7, &(0x7f00000000c0), 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x24, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 01:41:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:41:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12013, r0, 0x0) [ 3324.992972][ T3784] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:41:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:20 executing program 0: capset(&(0x7f0000000040)={0x19980330}, &(0x7f00009b3000)) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') sendfile(r0, r0, 0x0, 0x40000000000042d4) 01:41:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, &(0x7f0000000180)) fallocate(r0, 0x0, 0x0, 0x1000100) lseek(r0, 0x0, 0x3) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) msgrcv(0x0, 0x0, 0x0, 0x0, 0x1000) msgget$private(0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x1f) 01:41:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3325.126074][ T3793] IPVS: ftp: loaded support on port[0] = 21 01:41:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) [ 3325.221828][ T3806] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:20 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:41:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='\x00'/14) fchdir(r0) syz_execute_func(&(0x7f0000000200)="910f056969ef69dc00d98ee4d0d00fd1b02db5d9003ef3400f2dc770e4c653fb0fa1c7f965a13c3b6446ddcbc0eacbcb69289bd19d670f381d6a2f67450f483bd1d97c7c63460f5757c166460fd522787896a9c1460000e1b1ac660f63d8892a0f000000c4419a5227") 01:41:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, &(0x7f0000000180)) fallocate(r0, 0x0, 0x0, 0x1000100) lseek(r0, 0x0, 0x3) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) msgrcv(0x0, 0x0, 0x0, 0x0, 0x1000) msgget$private(0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x1f) 01:41:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:21 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x0, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3325.523471][ T3833] IPVS: ftp: loaded support on port[0] = 21 01:41:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:41:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:21 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:41:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3325.869531][ T3844] IPVS: ftp: loaded support on port[0] = 21 [ 3326.037204][ T3862] IPVS: ftp: loaded support on port[0] = 21 01:41:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, &(0x7f0000000180)) fallocate(r0, 0x0, 0x0, 0x1000100) lseek(r0, 0x0, 0x3) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) msgrcv(0x0, 0x0, 0x0, 0x0, 0x1000) msgget$private(0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x1f) 01:41:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:41:22 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:41:22 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3326.635057][ T3882] IPVS: ftp: loaded support on port[0] = 21 01:41:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:41:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3326.895373][ T3887] IPVS: ftp: loaded support on port[0] = 21 01:41:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, &(0x7f0000000180)) fallocate(r0, 0x0, 0x0, 0x1000100) lseek(r0, 0x0, 0x3) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) msgrcv(0x0, 0x0, 0x0, 0x0, 0x1000) msgget$private(0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x1f) 01:41:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:22 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:41:22 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) [ 3327.514024][ T3918] IPVS: ftp: loaded support on port[0] = 21 01:41:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:41:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3327.797675][ T3924] IPVS: ftp: loaded support on port[0] = 21 01:41:23 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x0, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3328.173860][ T3946] audit_tg_check: 10 callbacks suppressed [ 3328.173869][ T3946] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3328.293322][ T3948] IPVS: ftp: loaded support on port[0] = 21 01:41:25 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:25 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:41:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:25 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x0, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3330.478192][ T3953] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3330.510128][ T3961] IPVS: ftp: loaded support on port[0] = 21 01:41:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:41:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) [ 3330.690730][ T3956] IPVS: ftp: loaded support on port[0] = 21 [ 3330.734711][ T3973] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3330.784423][ T3963] IPVS: ftp: loaded support on port[0] = 21 01:41:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:41:29 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) unshare(0x40000000) 01:41:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:29 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) [ 3334.203024][ T3992] IPVS: ftp: loaded support on port[0] = 21 [ 3334.213849][ T3988] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:29 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) unshare(0x40000000) 01:41:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:41:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3334.402345][ T4002] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) [ 3334.483427][ T3997] IPVS: ftp: loaded support on port[0] = 21 01:41:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3334.610601][ T4015] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3334.717883][ T4009] IPVS: ftp: loaded support on port[0] = 21 01:41:32 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) unshare(0x40000000) 01:41:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:41:32 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:32 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x0, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3336.822582][ T4034] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:41:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:41:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3337.059487][ T4028] IPVS: ftp: loaded support on port[0] = 21 [ 3337.081684][ T4030] IPVS: ftp: loaded support on port[0] = 21 [ 3337.096571][ T4046] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3337.200256][ T4037] IPVS: ftp: loaded support on port[0] = 21 [ 3337.293905][ T4055] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:35 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) unshare(0x40000000) 01:41:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:41:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:35 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:35 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x0, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3340.311007][ T4064] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) [ 3340.450428][ T4067] IPVS: ftp: loaded support on port[0] = 21 01:41:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3340.556859][ T4080] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) [ 3340.650774][ T4069] IPVS: ftp: loaded support on port[0] = 21 [ 3340.661931][ T4073] IPVS: ftp: loaded support on port[0] = 21 01:41:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3340.869170][ T4093] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:38 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) 01:41:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:38 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3343.248071][ T4101] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3343.465290][ T4106] IPVS: ftp: loaded support on port[0] = 21 [ 3343.490068][ T4103] IPVS: ftp: loaded support on port[0] = 21 01:41:39 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x0, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:41:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:39 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3344.411015][ T4115] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) [ 3344.652659][ T4120] IPVS: ftp: loaded support on port[0] = 21 [ 3344.665373][ T4122] IPVS: ftp: loaded support on port[0] = 21 01:41:41 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:41:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3346.219497][ T4140] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3346.421434][ T4138] IPVS: ftp: loaded support on port[0] = 21 01:41:43 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) unshare(0x40000000) 01:41:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:41:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:43 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:43 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3348.470030][ T4160] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:41:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3348.652403][ T4154] IPVS: ftp: loaded support on port[0] = 21 01:41:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3348.696461][ T4171] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3348.716331][ T4158] IPVS: ftp: loaded support on port[0] = 21 01:41:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3348.777572][ T4162] IPVS: ftp: loaded support on port[0] = 21 [ 3348.875515][ T4178] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:47 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:41:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:47 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:47 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) unshare(0x40000000) [ 3352.281061][ T4187] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:41:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3352.509474][ T4190] IPVS: ftp: loaded support on port[0] = 21 01:41:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:41:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3352.570643][ T4198] IPVS: ftp: loaded support on port[0] = 21 [ 3352.589205][ T4207] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3352.603949][ T4196] IPVS: ftp: loaded support on port[0] = 21 01:41:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3352.838567][ T4217] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:48 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) [ 3353.166810][ T4221] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3353.376728][ T4228] IPVS: ftp: loaded support on port[0] = 21 01:41:50 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:50 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) unshare(0x40000000) 01:41:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:41:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:50 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3354.737485][ T4241] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:41:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:41:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3355.032157][ T4257] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3355.032795][ T4243] IPVS: ftp: loaded support on port[0] = 21 [ 3355.063671][ T4236] IPVS: ftp: loaded support on port[0] = 21 01:41:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) [ 3355.220816][ T4248] IPVS: ftp: loaded support on port[0] = 21 01:41:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3355.693259][ T4271] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:53 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) unshare(0x40000000) 01:41:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:41:53 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3358.186499][ T4277] IPVS: ftp: loaded support on port[0] = 21 [ 3358.241095][ T4283] IPVS: ftp: loaded support on port[0] = 21 01:41:53 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:41:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3358.415246][ T4285] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:41:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:41:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3358.652658][ T4301] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3358.855818][ T4292] IPVS: ftp: loaded support on port[0] = 21 01:41:54 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff]}) unshare(0x40000000) 01:41:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:41:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3359.030087][ T4309] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3359.312178][ T4314] IPVS: ftp: loaded support on port[0] = 21 01:41:57 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:57 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:41:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:57 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff]}) unshare(0x40000000) 01:41:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) [ 3361.569345][ T4326] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3361.606081][ T4321] IPVS: ftp: loaded support on port[0] = 21 01:41:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) [ 3361.816606][ T4340] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3361.831341][ T4322] IPVS: ftp: loaded support on port[0] = 21 01:41:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3361.920446][ T4332] IPVS: ftp: loaded support on port[0] = 21 01:41:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:57 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3362.069446][ T4350] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3362.113755][ T4352] IPVS: ftp: loaded support on port[0] = 21 01:41:58 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:41:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3362.627533][ T4358] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3362.847509][ T4365] IPVS: ftp: loaded support on port[0] = 21 01:41:59 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff]}) unshare(0x40000000) 01:41:59 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:41:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:41:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x4}}]}]}, 0x178) 01:41:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:59 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff]}) unshare(0x40000000) [ 3364.225695][ T4375] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3364.272120][ T4373] IPVS: ftp: loaded support on port[0] = 21 01:41:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) 01:41:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:41:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3364.476248][ T4378] IPVS: ftp: loaded support on port[0] = 21 [ 3364.508025][ T4390] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:42:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:42:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) [ 3364.547232][ T4382] IPVS: ftp: loaded support on port[0] = 21 01:42:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3364.890258][ T4395] IPVS: ftp: loaded support on port[0] = 21 01:42:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:42:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:42:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:03 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0x0, 0x0, 0x8]}) unshare(0x40000000) 01:42:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3367.602053][ T4411] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3367.813621][ T4415] IPVS: ftp: loaded support on port[0] = 21 [ 3367.858829][ T4413] IPVS: ftp: loaded support on port[0] = 21 01:42:03 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff]}) unshare(0x40000000) 01:42:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:42:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:42:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) [ 3368.478957][ T4425] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:42:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:42:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:42:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3368.719575][ T4437] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3368.723351][ T4427] IPVS: ftp: loaded support on port[0] = 21 01:42:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:42:06 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0x0, 0x0, 0x8]}) unshare(0x40000000) 01:42:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:42:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:42:06 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff]}) unshare(0x40000000) 01:42:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) [ 3371.289058][ T4459] xt_AUDIT: Audit type out of range (valid range: 0..2) 01:42:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x4}}]}]}, 0x178) 01:42:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:42:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x4}}]}]}, 0x178) [ 3371.542540][ T4457] IPVS: ftp: loaded support on port[0] = 21 [ 3371.564222][ T4472] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3371.632885][ T4463] IPVS: ftp: loaded support on port[0] = 21 [ 3371.644154][ T4460] IPVS: ftp: loaded support on port[0] = 21 01:42:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:10 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0x0, 0x0, 0x8]}) unshare(0x40000000) 01:42:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:42:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x4}}]}]}, 0x178) 01:42:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3374.548792][ T4489] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 3374.718045][ T4495] IPVS: ftp: loaded support on port[0] = 21 01:42:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000100)=0x6, 0x4) 01:42:10 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:42:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0xa, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:42:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x4}}]}]}, 0x178) 01:42:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:10 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x0, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:42:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x10, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3375.497078][ T4508] IPVS: ftp: loaded support on port[0] = 21 01:42:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x4}}]}]}, 0x178) 01:42:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x200, 0x10) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000100)=0xfffffffffffffc01) r2 = msgget(0x1, 0x400) msgsnd(r2, &(0x7f0000000280)={0x0, "5d04b36a0901a746a18746f660100dfdca47deae53fb7db557fcd80b49"}, 0x25, 0x800) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0xffd8) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f0000000000)=ANY=[@ANYBLOB="1ceaffff2c1d239e5d7b17412e2b0001ff00faf713cbb8e05e10e38aecc513d5f8cdf6c64f"], 0x1}}, 0x0) [ 3375.638406][ T4506] IPVS: ftp: loaded support on port[0] = 21 01:42:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00', 0x4}}]}]}, 0x178) 01:42:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x25, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:42:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:11 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:42:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x4}}]}]}, 0x178) 01:42:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) [ 3376.094976][ T4540] IPVS: ftp: loaded support on port[0] = 21 [ 3376.299026][ T26] audit: type=1326 audit(1556329331.779:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4546 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=40000003 syscall=265 compat=1 ip=0xf7fa8869 code=0x7ffc0000 [ 3376.325404][ T26] audit: type=1326 audit(1556329331.809:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4546 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7fa8869 code=0x7ffc0000 [ 3376.375918][ T26] audit: type=1326 audit(1556329331.809:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4546 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7fa8869 code=0x7ffc0000 [ 3376.405244][ T26] audit: type=1326 audit(1556329331.829:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4546 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=40000003 syscall=265 compat=1 ip=0xf7fa8869 code=0x7ffc0000 [ 3376.469044][ T26] audit: type=1326 audit(1556329331.829:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4546 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=40000003 syscall=172 compat=1 ip=0xf7fa8869 code=0x7ffc0000 [ 3376.492574][ T26] audit: type=1326 audit(1556329331.829:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4546 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=40000003 syscall=265 compat=1 ip=0xf7fa8869 code=0x7ffc0000 [ 3376.526834][ T26] audit: type=1326 audit(1556329331.829:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4546 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7fa8869 code=0x7ffc0000 [ 3376.556688][ T26] audit: type=1326 audit(1556329331.829:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4546 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7fa8869 code=0x7ffc0000 01:42:13 executing program 1: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0x0, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x100, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x0, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:42:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x2f, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) 01:42:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x4}}]}]}, 0x178) 01:42:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 01:42:13 executing program 0: socket$inet_tcp(0x2, 0x3, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x101400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x2, 0x0, 0x7, 0x75d7f6c8, 0xff, 0x100, 0xfff, 0x3ff, 0x0, 0x200f28e3, 0x2, 0x5, 0x7ff, 0x0, 0x4, 0x8c, 0x6bc, 0x100, 0x0, 0xff, 0x375, 0x0, 0x9, 0x8, 0x9, 0x9, 0x1, 0xffff, 0x0, 0x8]}) unshare(0x40000000) 01:42:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4}}]}]}, 0x178) 01:42:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x4d, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6erspan0\x00', 'nr0\x00', 'bridge_slave_0\x00', 'veth0_to_bond\x00', @broadcast, [], @broadcast, [], 0x70, 0xc0, 0xe8}, [@common=@redirect={'redirect\x00', 0x4, {{0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1c8) [ 3377.813105][ T4563] IPVS: ftp: loaded support on port[0] = 21 01:42:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) 01:42:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00\x05\x00\x04\x00\x00\x97\x00\x1dD\x00\x00\x0f\x00', 0xffd}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:42:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x2, 0x128, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'hwsim0\x00', 'syzkaller1\x00', 'veth1_to_bridge\x00', 'ip6gre0\x00', @random="38ad53811e47", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}}]}]}, 0x178) [ 3378.050018][ T4580] WARNING: CPU: 1 PID: 4580 at net/bridge/netfilter/ebtables.c:1973 compat_copy_entries+0x108d/0x1390 [ 3378.059000][ T4566] IPVS: ftp: loaded support on port[0] = 21 [ 3378.061402][ T4580] Kernel panic - not syncing: panic_on_warn set ... [ 3378.074100][ T4580] CPU: 1 PID: 4580 Comm: syz-executor.4 Not tainted 5.1.0-rc6+ #86 [ 3378.082174][ T4580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3378.093118][ T4580] Call Trace: [ 3378.096436][ T4580] dump_stack+0x172/0x1f0 [ 3378.100782][ T4580] ? compat_copy_entries+0x1020/0x1390 [ 3378.106810][ T4580] panic+0x2cb/0x65c [ 3378.110726][ T4580] ? __warn_printk+0xf3/0xf3 [ 3378.115343][ T4580] ? compat_copy_entries+0x108d/0x1390 [ 3378.120837][ T4580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.125406][ T4563] kobject: 'ip6tnl0' (000000005f8ef931): kobject_uevent_env [ 3378.127171][ T4580] ? __warn.cold+0x5/0x45 [ 3378.127194][ T4580] ? compat_copy_entries+0x108d/0x1390 [ 3378.127215][ T4580] __warn.cold+0x20/0x45 [ 3378.127236][ T4580] ? compat_copy_entries+0x108d/0x1390 [ 3378.135008][ T4563] kobject: 'ip6tnl0' (000000005f8ef931): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 3378.139046][ T4580] report_bug+0x263/0x2b0 [ 3378.139067][ T4580] do_error_trap+0x11b/0x200 [ 3378.139086][ T4580] do_invalid_op+0x37/0x50 [ 3378.139100][ T4580] ? compat_copy_entries+0x108d/0x1390 [ 3378.139115][ T4580] invalid_op+0x14/0x20 [ 3378.139129][ T4580] RIP: 0010:compat_copy_entries+0x108d/0x1390 01:42:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x1c4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'eql\x00', 'veth1_to_hsr\x00', 'erspan0\x00', 'ip_vti0\x00', @random="42c64c3b6001", [], @dev, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'bcsf0\x00', 'yam0\x00', 'veth0_to_bridge\x00', 'team0\x00', @broadcast, [], @local, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x214) [ 3378.139143][ T4580] Code: 8b bd 10 ff ff ff 48 8d 70 24 e8 8e 0d 6f fb e9 1e ff ff ff e8 94 1a 37 fb 0f 0b bb ea ff ff ff e9 cb f4 ff ff e8 83 1a 37 fb <0f> 0b bb ea ff ff ff e9 ba f4 ff ff 4c 8b a5 f8 fe ff ff bb ea ff [ 3378.139151][ T4580] RSP: 0018:ffff888065ccf918 EFLAGS: 00010216 [ 3378.139163][ T4580] RAX: 0000000000040000 RBX: 0000000000000006 RCX: ffffc9000e657000 [ 3378.139173][ T4580] RDX: 00000000000009de RSI: ffffffff8639726d RDI: 000000000000012e [ 3378.139182][ T4580] RBP: ffff888065ccfa90 R08: ffff8880854da380 R09: fffff52000b83e26 [ 3378.139191][ T4580] R10: fffff52000b83e25 R11: ffffc90005c1f12b R12: 0000000000000002 [ 3378.139207][ T4580] R13: 000000000000012a R14: ffff888065ccfaf0 R15: dffffc0000000000 [ 3378.139229][ T4580] ? compat_copy_entries+0x108d/0x1390 [ 3378.150622][ T4563] kobject: 'queues' (000000004cd557a8): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 3378.154742][ T4580] ? compat_copy_entries+0x108d/0x1390 [ 3378.154772][ T4580] ? compat_table_info+0x670/0x670 [ 3378.154791][ T4580] ? compat_do_replace+0x3e5/0x680 [ 3378.154811][ T4580] compat_do_replace+0x468/0x680 [ 3378.171712][ T4563] kobject: 'queues' (000000004cd557a8): kobject_uevent_env [ 3378.174045][ T4580] ? do_ebt_set_ctl+0x110/0x110 [ 3378.174067][ T4580] ? refcount_dec_and_test_checked+0x1b/0x20 [ 3378.174082][ T4580] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3378.174107][ T4580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3378.180981][ T4563] kobject: 'queues' (000000004cd557a8): kobject_uevent_env: filter function caused the event to drop! [ 3378.184338][ T4580] ? ns_capable_common+0x93/0x100 [ 3378.184362][ T4580] compat_do_ebt_set_ctl+0x229/0x278 [ 3378.184379][ T4580] ? compat_do_replace+0x680/0x680 [ 3378.184403][ T4580] ? wait_for_completion+0x440/0x440 [ 3378.192612][ T4563] kobject: 'rx-0' (000000006580a61f): kobject_add_internal: parent: 'queues', set: 'queues' [ 3378.194800][ T4580] ? mutex_unlock+0xd/0x10 [ 3378.194819][ T4580] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 3378.194838][ T4580] compat_nf_setsockopt+0x9b/0x140 [ 3378.194860][ T4580] ? compat_do_replace+0x680/0x680 [ 3378.304623][ T4563] kobject: 'rx-0' (000000006580a61f): kobject_uevent_env [ 3378.307246][ T4580] compat_ip_setsockopt+0x106/0x140 [ 3378.307267][ T4580] compat_raw_setsockopt+0xe0/0x100 [ 3378.307293][ T4580] compat_sock_common_setsockopt+0xb4/0x150 [ 3378.344303][ T4563] kobject: 'rx-0' (000000006580a61f): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 3378.346646][ T4580] ? raw_seticmpfilter+0x90/0x90 [ 3378.346670][ T4580] __compat_sys_setsockopt+0x181/0x380 [ 3378.346684][ T4580] ? sock_common_setsockopt+0xe0/0xe0 [ 3378.346707][ T4580] ? compat_sock_get_timestampns+0x220/0x220 [ 3378.361298][ T3876] kobject: 'loop5' (0000000036ccad2d): kobject_uevent_env [ 3378.362570][ T4580] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3378.386532][ T3876] kobject: 'loop5' (0000000036ccad2d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3378.388142][ T4580] ? do_fast_syscall_32+0xd1/0xc98 [ 3378.388160][ T4580] ? entry_SYSENTER_compat+0x70/0x7f [ 3378.388174][ T4580] ? do_fast_syscall_32+0xd1/0xc98 [ 3378.388193][ T4580] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 3378.388220][ T4580] do_fast_syscall_32+0x281/0xc98 [ 3378.388238][ T4580] entry_SYSENTER_compat+0x70/0x7f [ 3378.388250][ T4580] RIP: 0023:0xf7fd7869 [ 3378.388266][ T4580] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 3378.388274][ T4580] RSP: 002b:00000000f5dd30cc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 3378.388287][ T4580] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 3378.388295][ T4580] RDX: 0000000000000080 RSI: 0000000020000580 RDI: 0000000000000178 [ 3378.388312][ T4580] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3378.409723][ T3876] kobject: 'loop3' (0000000024145452): kobject_uevent_env [ 3378.410825][ T4580] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3378.410834][ T4580] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3378.418003][ T4580] Kernel Offset: disabled [ 3378.588260][ T4580] Rebooting in 86400 seconds..