30726] kernel msg: ebtables bug: please report to author: bad policy 21:14:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0x10, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{0x0, 0xfff, 0x7}, 0x8, 0x2, 0x0, 0x0, "cacf49027cfb43a8"}, 0x10}}, 0x24000000) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4, 0x0, 0xd}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x28, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x14, 0x6b, @ipv6=@loopback}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) [ 2059.744348] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2059.766931] kernel msg: ebtables bug: please report to author: bad policy 21:14:57 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:14:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x0, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:14:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2059.802946] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 2059.812824] kernel msg: ebtables bug: please report to author: bad policy [ 2059.835212] kernel msg: ebtables bug: please report to author: bad policy 21:14:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x40, 0x0) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) open_by_handle_at(r1, &(0x7f0000000280)={0x73, 0x4, "bf3074b940477403b58f742cb79685eca96c3041c415d6e25de88f041147963c03be83dba8bec421b56122f145241620359f7680612c00b7d8aa2f45ed9b15f61580c403c1874622ea7fa21784b018237507eb30f4bfa2d052554d7ecf189a7ed3900a765c4a06f6b5603c"}, 0x400000) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f00000001c0)={0x0, 0xffffffff, 0x8001, [], &(0x7f0000000180)=0x8}) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veteam\x00\x00\x00)L\x00', @local, [0xff], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x4}}}}]}]}, 0x1a8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'lapb0\x00', &(0x7f0000000200)=@ethtool_link_settings={0x4d, 0x0, 0x7, 0x100000000, 0x7, 0x3, 0x4, 0x4, 0x5, 0xc58d, [0x5, 0x4, 0x3, 0x8001, 0x9, 0x1, 0x8000, 0xffffffff], [0x101, 0x7, 0x0]}}) 21:14:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2059.888503] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 2059.890927] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2059.904469] kernel msg: ebtables bug: please report to author: bad policy 21:14:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2060.016489] kernel msg: ebtables bug: please report to author: bad policy 21:14:57 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2060.137521] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 2060.160626] kernel msg: ebtables bug: please report to author: bad policy [ 2060.178247] kernel msg: ebtables bug: please report to author: bad policy 21:14:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x0, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:14:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x400, 0x80) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mq_open(&(0x7f00000000c0)='selinuxvboxnet0\x00', 0x0, 0xa, &(0x7f0000000100)={0x9, 0x2, 0x8, 0x80000001, 0xfffffffffffff3cc, 0x0, 0x5, 0x3}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x1ae) [ 2060.227830] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 2060.235044] kernel msg: ebtables bug: please report to author: bad policy [ 2060.258435] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:14:58 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2060.375994] kernel msg: ebtables bug: please report to author: bad policy 21:14:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2060.551329] kernel msg: ebtables bug: please report to author: bad policy [ 2060.570493] kernel msg: ebtables bug: please report to author: Wrong len argument 21:14:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fstat(r1, &(0x7f00000003c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd\x00') ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)={0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000200)={r5, r6, 0x3}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000800)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000600)={0x198, r7, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2360}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x18}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @loopback}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffffffffff64}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8000000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x40000}, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x8000, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x100) 21:14:58 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:14:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:14:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x0, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2060.627078] kernel msg: ebtables bug: please report to author: bad policy [ 2060.656724] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:14:58 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:14:58 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2060.720737] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2060.795038] kernel msg: ebtables bug: please report to author: bad policy [ 2060.804075] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2060.809429] kernel msg: ebtables bug: please report to author: bad policy 21:14:58 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:14:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3e2c, 0x2002) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x1}) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/113, 0x71) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xf) socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x40000800800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'nr \x00\x00\x00\x00\x05\x00', 'yam0\x00', 'ifb0\x00', 'veteam\x00\x00\x00)L\x00', @local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x4}}}}]}]}, 0x1a8) 21:14:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2060.853106] kernel msg: ebtables bug: please report to author: bad policy [ 2060.944701] kernel msg: ebtables bug: please report to author: bad policy 21:14:58 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:14:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x0, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2061.027870] kernel msg: ebtables bug: please report to author: bad policy [ 2061.048604] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2061.098790] kernel msg: ebtables bug: please report to author: bad policy [ 2061.120990] kernel msg: ebtables bug: please report to author: bad policy 21:14:58 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:14:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/nfsfs\x00') getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) [ 2061.164726] kernel msg: ebtables bug: please report to author: bad policy 21:14:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:14:58 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2061.329348] kernel msg: ebtables bug: please report to author: bad policy [ 2061.338668] kernel msg: ebtables bug: please report to author: bad policy [ 2061.352177] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2061.371230] kernel msg: ebtables bug: please report to author: bad policy 21:14:59 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:14:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x0, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2061.392319] kernel msg: ebtables bug: please report to author: bad policy [ 2061.399486] protocol 88fb is buggy, dev hsr_slave_0 [ 2061.399545] protocol 88fb is buggy, dev hsr_slave_1 21:14:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2061.471374] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:14:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2061.552936] kernel msg: ebtables bug: please report to author: bad policy [ 2061.580590] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2061.591263] kernel msg: ebtables bug: please report to author: bad policy [ 2061.668538] kernel msg: ebtables bug: please report to author: bad policy [ 2061.721911] kernel msg: ebtables bug: please report to author: bad policy 21:14:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/180, &(0x7f0000000040)=0xb4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veteam\x00\x00\x00)L\x00', @local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x4}}}}]}]}, 0x1a8) 21:14:59 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:14:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:14:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:14:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x0, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:14:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0xfffffd00, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{0x4, 0x3ff, 0x6, 0xa012, 0x5, 0x10000, 0xfffffffffffffff7, 0x9a, 0x100000000, 0x6, 0x0, 0x80000000, 0x6}, {0xa091, 0x80, 0x1, 0x2, 0x2, 0xffffffffffff7fff, 0x6e1, 0x0, 0x1ff, 0x1, 0x3ff, 0x3, 0x40}, {0xbf2, 0x7, 0x8000, 0x1000, 0x2, 0x10000, 0x81, 0xfffffffeffffffff, 0x5, 0x1, 0x8000, 0x6, 0x1}], 0x9}) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) 21:14:59 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2061.926444] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2061.928526] kernel msg: ebtables bug: please report to author: bad policy [ 2061.946196] kernel msg: ebtables bug: please report to author: bad policy [ 2061.958189] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 2061.999851] kernel msg: ebtables bug: please report to author: bad policy 21:14:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:14:59 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x7, 0x210000) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000200)=&(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000240)=0x4) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x0, 0x5, [@dev={[], 0x1b}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @dev={[], 0x13}, @remote, @dev={[], 0x1a}]}) r4 = socket$netlink(0x10, 0x3, 0x5) prctl$PR_CAP_AMBIENT(0x2f, 0x7, 0xb) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f00000000c0)) sendmsg$nl_route(r4, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x3020448}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=@ipv6_getmulticast={0x14, 0x3a, 0x400, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veteam\x00\x00\x00)L\x00', @local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x4}}}}]}]}, 0x1a8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000580)='htcp\x00', 0x5) [ 2062.066139] kernel msg: ebtables bug: please report to author: bad policy [ 2062.087914] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:14:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:14:59 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:14:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x0, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2062.154008] kernel msg: ebtables bug: please report to author: bad policy 21:14:59 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:14:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2062.238001] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2062.257045] kernel msg: ebtables bug: please report to author: bad policy [ 2062.266980] kernel msg: ebtables bug: please report to author: bad policy [ 2062.276969] xt_AUDIT: Audit type out of range (valid range: 0..2) 21:14:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:15:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2062.367210] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x1, 0x0) lookup_dcookie(0x0, &(0x7f00000005c0)=""/4096, 0x1000) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) 21:15:00 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2062.486441] kernel msg: ebtables bug: please report to author: bad policy 21:15:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2062.529522] kernel msg: ebtables bug: please report to author: bad policy [ 2062.549455] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x0, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:00 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2062.597331] kernel msg: ebtables bug: please report to author: bad policy [ 2062.723775] kernel msg: ebtables bug: please report to author: bad policy 21:15:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:00 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2062.774259] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2062.796188] kernel msg: ebtables bug: please report to author: bad policy 21:15:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2062.962176] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2062.986332] kernel msg: ebtables bug: please report to author: bad policy [ 2063.024688] kernel msg: ebtables bug: please report to author: bad policy [ 2063.035189] kernel msg: ebtables bug: please report to author: bad policy [ 2063.072665] kernel msg: ebtables bug: please report to author: bad policy 21:15:01 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x0, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x2040, 0x0) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000240)) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000280)={0x4, 0x6}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veteam\x00\x00\x00)L\x00', @local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x4}}}}]}]}, 0x1a8) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000002}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r3, 0x0, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x2, @media='eth\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) 21:15:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x80000000000201, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x14}) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x2) [ 2063.684831] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2063.707269] kernel msg: ebtables bug: please report to author: bad policy 21:15:01 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2063.733736] kernel msg: ebtables bug: please report to author: bad policy [ 2063.777143] kernel msg: ebtables bug: please report to author: bad policy [ 2063.794239] kernel msg: ebtables bug: please report to author: bad policy [ 2063.829383] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x0, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:01 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2063.969785] kernel msg: ebtables bug: please report to author: bad policy [ 2063.981564] kernel msg: ebtables bug: please report to author: bad policy [ 2064.030947] kernel msg: ebtables bug: please report to author: bad policy [ 2064.059320] kernel msg: ebtables bug: please report to author: bad policy [ 2064.087752] IPVS: ftp: loaded support on port[0] = 21 [ 2064.089444] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:01 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:01 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x0, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2064.239692] kernel msg: ebtables bug: please report to author: bad policy [ 2064.299576] kernel msg: ebtables bug: please report to author: bad policy [ 2064.310361] kernel msg: ebtables bug: please report to author: bad policy [ 2064.330710] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2064.529586] chnl_net:caif_netlink_parms(): no params data found [ 2064.610198] bridge0: port 1(bridge_slave_0) entered blocking state [ 2064.622931] bridge0: port 1(bridge_slave_0) entered disabled state [ 2064.630502] device bridge_slave_0 entered promiscuous mode [ 2064.638347] bridge0: port 2(bridge_slave_1) entered blocking state [ 2064.644814] bridge0: port 2(bridge_slave_1) entered disabled state [ 2064.659984] device bridge_slave_1 entered promiscuous mode [ 2064.688193] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2064.698355] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2064.720773] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2064.729111] team0: Port device team_slave_0 added [ 2064.734772] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2064.742770] team0: Port device team_slave_1 added [ 2064.748698] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2064.757129] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2064.819034] device hsr_slave_0 entered promiscuous mode [ 2064.876919] device hsr_slave_1 entered promiscuous mode [ 2064.929093] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2064.936433] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2064.951175] bridge0: port 2(bridge_slave_1) entered blocking state [ 2064.957605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2064.964232] bridge0: port 1(bridge_slave_0) entered blocking state [ 2064.970668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2065.011916] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2065.018945] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2065.027555] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2065.037456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2065.044716] bridge0: port 1(bridge_slave_0) entered disabled state [ 2065.052181] bridge0: port 2(bridge_slave_1) entered disabled state [ 2065.061529] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2065.077563] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2065.083706] 8021q: adding VLAN 0 to HW filter on device team0 [ 2065.093811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2065.101870] bridge0: port 1(bridge_slave_0) entered blocking state [ 2065.108304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2065.124172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2065.132073] bridge0: port 2(bridge_slave_1) entered blocking state [ 2065.138505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2065.159871] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2065.167737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2065.175574] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2065.192030] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2065.202016] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2065.214188] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2065.221530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2065.231119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2065.239078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2065.257873] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2065.269904] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2065.306732] audit_tg_check: 1 callbacks suppressed [ 2065.306740] xt_AUDIT: Audit type out of range (valid range: 0..2) 21:15:03 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001f80)='\x00', 0xffffffffffffffff}, 0x30) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000002000)=0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndseq(&(0x7f0000001f40)='/dev/snd/seq\x00', 0x0, 0x80000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x2000400) r3 = socket(0x400000000000b, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=@ethtool_link_settings={0x3}}) sendmmsg(r1, &(0x7f0000001e80)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @rand_addr=0x20}, 0x3, 0x3, 0x2}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)="e60381cfdf94cc1a10c98fb1789c19f6e38c0ac308a4b9743ebe4973a779189cf2fba2fa03fab2b9f563749b41e60504e0d83cef8beea5e42644f4a40d57041e8a2ffe334e7452ce80e30b108ca121b16343b47a613ba471dcb2a8c4d00a4dc61ae7c844d8f899c18da6873d50f73abf58fd99dd0f6b79dac4347b525afafa8fc3534a73658e26b3146e1bc4424549", 0x8f}, {&(0x7f0000000200)="540f93acfef8bab2c84a8bbcc12f1d36ce5150f2202fecaff1052dcba149e1c5b39d321f1717cb1680a3104052e90cca6ba53f285ba6930dd8c59f2656146276a2bc94262bf3b28f507235af791617344bea46a2db2415cc71c8d457e49035cb2427dcdaa593b20882f697ea802cfca18af017c2df4bdb2102efbf604c48277d21b766623b361b5e4ced6f08d244b85de84ddd106964a1d504688bca601acdd25be76392d361901ec0a95ec176463df6ba44ac72e2922cf807f8ffc349b9bb17d86b6580d217d204d6e75c0a11482d6c80872be3a87f2b1eca60a4f60d81106c936e0649f486c574dbbbcf41e2d17d0da990f2e2b6d5575546", 0xf9}], 0x2, &(0x7f00000004c0)=[{0xb0, 0x112, 0x400, "817c1312347a1f72b12883ed16a9a91c85e2c598d02847149e9aa10ba60b9b5592baff1bff0fbdc6835283aca0aa794af7720397f5e64d30eb2f0abe9bec9c26a2be2529c1af887bd07affc054c337c9ec9660e9263afedbe1848602ce5ad0439a7b00cf4871d0b84c7bfe99d678e6a354099acfe7a17f6af4ce3f306e215ec5d24c8b41e469fae1239ffc66a35a0af5d340a3eb057d25ee340d56"}, {0x70, 0x111, 0x2, "b9528d5a60b9eae5ba7e6dbd028276bc6c1adc4dbcacee7be1798dbea487d75230bc3ce6b7ff319be3e161b64e847600f4d4372f892be558e73d749271dabc93ff7db2669768b902eae9390f1ca1d546c2aab9fc357f97c6dd194cf953ea224c"}, {0xb8, 0x0, 0xffffffff, "9209b433e6dd62272c8abe9287855cc54ab2d0e696432fdde3729aa5689941dcd00af655be68ba606161ef257a6faec54accfd9284a9a17b5f9599e44e000b4267006a73876e81d0e00eabbe4d7de99137211cab555834a932d57822fd477f35a0a8cc709153956beaae1eb0ed43fd24f719da21d0ad4ad6990e678c15b56c9e97ebb198f9cb7183e0332392960c9a46467552651b955a3a1e53f83ffea2f354ca90ef8ebf96"}, {0xd8, 0x0, 0x5, "006355ed03a2b80da5cc657f8b3956027c7c7d05d4207aaedef44c1a3b67b6412e4e265657bbb952bc850d9a9549f9bd41dd1e3b3bd760d1d89ac9293c1a9308aae36ede181b83b864fea9a7622af2d52144f91634db0776639d183a83ff132a608eee14c57c134ae3af576d6711b2a42626eea9dd67a7afc24beabc8f2c2d0d1d979f4cd9273b7564f05343a5fad2c4f45868fad2eeb8280cb7f4073d8bea8288557935e592fa1fa953cd2555686a03cc57d0f145f26af7cf4b3e7c84be52da3a35"}, {0x50, 0x18f, 0x723, "6f278f0fc16f019979e058aa54293c572ac3c0ad6020759cec82a088e7ca5ff930a7309b8d63f776dfc020215310423d6f5499d8615e77e20075"}], 0x300}, 0x40}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000007c0)="0daddce4fcd3a1eaff284e07bd626ecf019e4ddb5bef74465d8a82d23a2bd37da9ed5f13eae727bc2cfb79d9874d9cf429ed2c3853b30ef69900c6ad65e49a84365f0621aa982243a47f94c6ccd1696498445d1a9d49d566e174e0ae126515ba504b796cda3cc54f4e27379700ab3cdde459165ab4a3be7916661d393974929bd1f572", 0x83}, {&(0x7f0000000880)="0a82141ebd48438a463278e9dbc667dc4862159014920aad1bc3f5214b34125faddac42f4d7f27b688892248da42e5e4e41d002faa452c116643e9b83749ddbbc938d8fe853c2421946a107df80f793df854347ebf2b2e3434cea1457dfa2e5fd665b3f13152c4dbf1e697a1a9b438431f9a9078dd18200a6ab4f4e2ccae93fefbf74344e5e576540e3bcde347ea4c88e956569dbf3ab8555c3940857e81feed8681e0a4d1f8249f4669d7e40cb30b2ae6caaf80c509c8160d3279a0a26374b231a7b99a641b9a68875392db2c6ca036d2794620fc12cba0f1e3127638a935d8b08ca80fc307056920ce0c", 0xeb}], 0x2}, 0x3}, {{&(0x7f00000009c0)=@pptp={0x18, 0x2, {0x1, @local}}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000a40)="be5282c0498b185190165436f31c41d215fd583663b75e77664da8dc87f400eadb5c8c761f02a6d0292f0dd8d0a3a17a71607fea553c28041e2f39e594c5fe7410112a1dc649910539a2b94da98b8d83b69cfccc56ed36f70f4c931d34ed17b7c8e3d6bdd4386014c72eee4b994a2083c741687f48014309ce5bdd66ece731bd027174caad99c0fc39c28bdcd163fd5c293332b26c74f437c30fd547c49f94a0b125ae816180e71976d2d62c081f0ae5b7e57b104b0193b2033edfb6a42cd45e3a29071ed55fe2297584157915f07127f852948535965929eb94006ec0283f4220d1a19527b974396ff38260519499a9", 0xf0}, {&(0x7f0000000b40)="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", 0x1000}, {&(0x7f0000001b40)="f2daeb1e1282a36d0d282ac13f2399f8717d77d784161230b0bfd29dc7540ec0a7bb80afa4b8bc0d985aac4e3bcb7d15f4e5ebd6fb65faf0ef2b804005993375ed0a356b4c194bc246c3157d09f09804e108b223e7f47eb2116f49ae92099b9418fa9ff3139f4dbd5e3eb2f46cf41bdd05e905f14fcdfbc6c5504323793f524751b7cdf5a322ab1830279aaba4ac6d6f200d7843a8028390bc950a04503644f9315fdcad96e32c80f7aaa74ea59ba9", 0xaf}, {&(0x7f0000001c00)="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", 0xfc}, {&(0x7f0000001d00)="3952aa6ad07747f8298cf76859afaf1a7cc0161707af9f83ab08831435eb97047baffb838151eab053f6ebf8696ce3b0129fbee34a8de951ffe4527ab793a1f08a9c9d2d1f67ae19c07a136e41709586025baae05f943ff1c7c3c4705f0f6a2849e010ca2260f08809349210e385e97de6acb3c3af9b9ab84d50abc0b6545dc6da8831c4c08fd9b8485d19dd35c6359aeb747e7424ea15381107087bec7a242dc2b4269f75c063f589195313b4cd2ea8836ff663ab924409ff2c2b", 0xbb}], 0x5, &(0x7f0000001e40)=[{0x10, 0x1, 0x4}], 0x10}, 0x8}], 0x3, 0x4000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='security.SMACK64\x00', &(0x7f0000000440)='keyring\x00', 0x8, 0x1) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000380)={0xff, 0xc86, 0x78, 0x2, 0x2, 0x9, 0x31cb000000, 0x0, 0x7fffffff, 0x0, 0x0, 0x9}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="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"]}, 0x1ae) 21:15:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000006, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000340)=""/175) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000600)={0x0, 0x2, 'client0\x00', 0x0, "f53f0094036c6c00", "63f91a3c787b91ec03f9fd428f0172e2c149b83499973de883ddba09a57dcc0e", 0x3, 0x33093e40}) r2 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f00000004c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'bctf0\x00\x00\x00\x00\x00\x00\"\x00'}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x45, 0x2) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) rt_sigtimedwait(&(0x7f0000000400), &(0x7f0000000500), &(0x7f0000000480), 0x8) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x600200, 0x0) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x802, 0x0) mkdirat(r3, &(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 21:15:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:03 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x0, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2065.324454] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 2065.373241] kernel msg: ebtables bug: please report to author: bad policy [ 2065.389344] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2065.399489] kernel msg: ebtables bug: please report to author: bad policy [ 2065.410117] kernel msg: ebtables bug: please report to author: bad policy 21:15:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2065.411208] kernel msg: ebtables bug: please report to author: bad policy [ 2065.468038] kernel msg: ebtables bug: please report to author: bad policy [ 2065.489266] kernel msg: ebtables bug: please report to author: Wrong len argument 21:15:03 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x0, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2065.527579] kernel msg: ebtables bug: please report to author: bad policy 21:15:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000007, 0x812, r0, 0x3f) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x1b2) 21:15:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\xff\xff\xff\xfc\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:03 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2065.689035] kernel msg: ebtables bug: please report to author: Wrong len argument 21:15:03 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2065.739067] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2065.741677] kernel msg: ebtables bug: please report to author: bad policy 21:15:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_use\x16\xc3', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veteam\x00\x00\x00)L\x00', @local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x4}}}}]}]}, 0x1a8) [ 2065.803034] kernel msg: ebtables bug: please report to author: bad policy [ 2065.827295] kernel msg: ebtables bug: please report to author: bad policy [ 2065.840519] kernel msg: ebtables bug: please report to author: bad policy 21:15:03 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2065.867893] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2065.906125] xt_AUDIT: Audit type out of range (valid range: 0..2) 21:15:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x8, 0x0, &(0x7f00000002c0)=[@decrefs={0x40086310}], 0x2, 0x0, 0x0}) 21:15:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x0, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2065.954201] kernel msg: ebtables bug: please report to author: bad policy [ 2065.962039] device bridge_slave_1 left promiscuous mode [ 2065.967965] bridge0: port 2(bridge_slave_1) entered disabled state [ 2065.982737] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x1fb) [ 2066.008108] device bridge_slave_0 left promiscuous mode [ 2066.013651] bridge0: port 1(bridge_slave_0) entered disabled state [ 2066.048254] kernel msg: ebtables bug: please report to author: bad policy [ 2066.081022] kernel msg: ebtables bug: please report to author: bad policy 21:15:03 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2066.131039] binder: 25159:25162 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 2066.140544] kernel msg: ebtables bug: please report to author: bad policy [ 2066.158902] kernel msg: ebtables bug: please report to author: bad policy [ 2066.168535] binder: 25159:25162 ioctl c0306201 20000380 returned -14 [ 2066.187156] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2066.231522] kernel msg: ebtables bug: please report to author: Wrong len argument 21:15:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r0, 0x0, 0xb, &(0x7f0000000200)='@\\]user\'%!\x00'}, 0x30) syz_open_procfs(r1, &(0x7f0000000100)='net/llc\x00') r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x2000, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='c\br\xd7p\xa7\x8dByntrollers\x00', 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xb5d8, 0x250400) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x122, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x19a) 21:15:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x0, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 2066.273750] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:04 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2066.359330] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 21:15:04 executing program 3: futex(0x0, 0x8c, 0xfffffffffffffffe, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000040)=@isdn, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="000207007fffffff10001c14f063905b580b50eb2fafb52a832246e4568bc8e70d65254032614cf99039886da54ca10a0f80f6504c87f158ad45e6c5518f266a0131b7569f3b4a825d14a874cee4bfbe23f87cc656b4c98dc20867d7f785e6f6628705a1e5b1863b49f9113093d8f591a4cd7a59f9c85dfeb5e7a1f461d8c4f1dd624f1f7b062adbcf083976433710cdf2b69cc4e7aff0d01d8d900fc19e98"], 0x1, 0x0) clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400000050032200c0010000f0000000f0000000f000000000000000b8020000b8020000b8020000b8020000b802000004"], 0x1) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:15:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f00000000c0)={0x10000, "bc2c539e6795cac7148681d7adae0d2c01e896ffd13d8f7663e34ffbb0046337", 0x3, 0x6, 0x0, 0x320000, 0x1, 0x2}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x1001200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veteam\x00\x00\x00)L\x00', @local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x4}}}}]}]}, 0x1a8) [ 2066.418871] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2066.439275] device hsr_slave_1 left promiscuous mode [ 2066.501664] device hsr_slave_0 left promiscuous mode [ 2066.571496] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 2066.744178] team0 (unregistering): Port device team_slave_1 removed [ 2066.790084] team0 (unregistering): Port device team_slave_0 removed [ 2066.813276] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2066.835832] protocol 88fb is buggy, dev hsr_slave_0 [ 2066.841334] protocol 88fb is buggy, dev hsr_slave_1 [ 2066.865474] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2066.954744] bond0 (unregistering): Released all slaves 21:15:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x0, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(r1, 0x0, 0x0, 0x10022, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x10000000004e20}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) 21:15:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x1, 0x0) lookup_dcookie(0x0, &(0x7f00000005c0)=""/4096, 0x1000) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) 21:15:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2067.084549] kernel msg: ebtables bug: please report to author: bad policy [ 2067.113254] kernel msg: ebtables bug: please report to author: bad policy [ 2067.125981] kernel msg: ebtables bug: please report to author: bad policy 21:15:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\xfc\xff\xff\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2067.134036] kernel msg: ebtables bug: please report to author: bad policy 21:15:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:04 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x7, 0x210000) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000200)=&(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000240)=0x4) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x0, 0x5, [@dev={[], 0x1b}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @dev={[], 0x13}, @remote, @dev={[], 0x1a}]}) r4 = socket$netlink(0x10, 0x3, 0x5) prctl$PR_CAP_AMBIENT(0x2f, 0x7, 0xb) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f00000000c0)) sendmsg$nl_route(r4, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x3020448}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=@ipv6_getmulticast={0x14, 0x3a, 0x400, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veteam\x00\x00\x00)L\x00', @local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x4}}}}]}]}, 0x1a8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000580)='htcp\x00', 0x5) [ 2067.236595] protocol 88fb is buggy, dev hsr_slave_0 [ 2067.242631] protocol 88fb is buggy, dev hsr_slave_1 [ 2067.244387] kernel msg: ebtables bug: please report to author: bad policy [ 2067.255729] kernel msg: ebtables bug: please report to author: bad policy [ 2067.272721] kernel msg: ebtables bug: please report to author: bad policy 21:15:05 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:05 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x0, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fstat(r1, &(0x7f00000003c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd\x00') ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)={0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000200)={r5, r6, 0x3}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000800)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000600)={0x198, r7, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2360}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x18}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @loopback}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffffffffff64}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8000000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x40000}, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x8000, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x100) [ 2067.436682] kernel msg: ebtables bug: please report to author: bad policy [ 2067.447287] xt_AUDIT: Audit type out of range (valid range: 0..2) 21:15:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0x10, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{0x0, 0xfff, 0x7}, 0x8, 0x2, 0x0, 0x0, "cacf49027cfb43a8"}, 0x10}}, 0x24000000) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4, 0x0, 0xd}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x28, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x14, 0x6b, @ipv6=@loopback}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) [ 2067.508596] kernel msg: ebtables bug: please report to author: bad policy [ 2067.555772] protocol 88fb is buggy, dev hsr_slave_0 [ 2067.560934] protocol 88fb is buggy, dev hsr_slave_1 [ 2067.583394] kernel msg: ebtables bug: please report to author: bad policy [ 2067.596646] kernel msg: ebtables bug: please report to author: bad policy [ 2067.635823] protocol 88fb is buggy, dev hsr_slave_0 [ 2067.640982] protocol 88fb is buggy, dev hsr_slave_1 21:15:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2067.715796] protocol 88fb is buggy, dev hsr_slave_0 [ 2067.720971] protocol 88fb is buggy, dev hsr_slave_1 21:15:05 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x0, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2067.809972] kernel msg: ebtables bug: please report to author: bad policy [ 2067.833170] kernel msg: ebtables bug: please report to author: bad policy 21:15:05 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2067.902238] kernel msg: ebtables bug: please report to author: bad policy [ 2067.918392] kernel msg: ebtables bug: please report to author: bad policy [ 2067.928185] IPVS: ftp: loaded support on port[0] = 21 21:15:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0x0, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2068.014178] kernel msg: ebtables bug: please report to author: bad policy [ 2068.083730] kernel msg: ebtables bug: please report to author: bad policy [ 2068.104829] kernel msg: ebtables bug: please report to author: bad policy [ 2068.377750] chnl_net:caif_netlink_parms(): no params data found [ 2068.455428] bridge0: port 1(bridge_slave_0) entered blocking state [ 2068.463503] bridge0: port 1(bridge_slave_0) entered disabled state [ 2068.478187] device bridge_slave_0 entered promiscuous mode [ 2068.491058] bridge0: port 2(bridge_slave_1) entered blocking state [ 2068.499741] bridge0: port 2(bridge_slave_1) entered disabled state [ 2068.512276] device bridge_slave_1 entered promiscuous mode [ 2068.541459] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2068.557967] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2068.586561] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2068.594153] team0: Port device team_slave_0 added [ 2068.611009] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2068.624062] team0: Port device team_slave_1 added [ 2068.632182] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2068.645284] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2068.725197] device hsr_slave_0 entered promiscuous mode [ 2068.767458] device hsr_slave_1 entered promiscuous mode [ 2068.806423] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2068.813488] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2068.844143] bridge0: port 2(bridge_slave_1) entered blocking state [ 2068.850614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2068.857347] bridge0: port 1(bridge_slave_0) entered blocking state [ 2068.863714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2068.945343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2068.963393] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2068.982477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2068.993944] bridge0: port 1(bridge_slave_0) entered disabled state [ 2069.011571] bridge0: port 2(bridge_slave_1) entered disabled state [ 2069.028734] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2069.034869] 8021q: adding VLAN 0 to HW filter on device team0 [ 2069.054086] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2069.069651] bridge0: port 1(bridge_slave_0) entered blocking state [ 2069.076106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2069.098285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2069.113680] bridge0: port 2(bridge_slave_1) entered blocking state [ 2069.120122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2069.154362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2069.162693] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2069.170841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2069.178884] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2069.190638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2069.198159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2069.206489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2069.217741] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2069.224157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2069.246295] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2069.260315] 8021q: adding VLAN 0 to HW filter on device batadv0 21:15:06 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:06 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x0, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x0, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc010643a, &(0x7f0000000080)={0x200000000000000}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x44000, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000040)={0x0, 0x1, [@dev={[], 0xc}]}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000030000000000000000008272300000000000000000000000000079616d3000000000000000000000000079616d3000000000000000000000000076657465616d000000294c0000000000aaaaaaaaaaaa000000000000aaaaaaaaaa0000000000000000007000000070000000a0000000415544495400000000000000000000000000000000000000000000000000000008000000000000000400000000000000"]}, 0x1a8) [ 2069.312372] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2069.354563] kernel msg: ebtables bug: please report to author: bad policy 21:15:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2069.398516] kernel msg: ebtables bug: please report to author: bad policy [ 2069.406467] kernel msg: ebtables bug: please report to author: bad policy [ 2069.481311] [drm:drm_calc_timestamping_constants] *ERROR* crtc 31: Can't calculate constants, dotclock = 0! 21:15:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2069.544948] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:07 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x0, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x0, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2069.684819] kernel msg: ebtables bug: please report to author: bad policy [ 2069.706129] kernel msg: ebtables bug: please report to author: bad policy [ 2069.798648] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 2069.807228] kernel msg: ebtables bug: please report to author: bad policy 21:15:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2069.925156] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:07 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2070.009538] kernel msg: ebtables bug: please report to author: bad policy 21:15:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc010643a, &(0x7f0000000080)={0x200000000000000}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x44000, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000040)={0x0, 0x1, [@dev={[], 0xc}]}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000030000000000000000008272300000000000000000000000000079616d3000000000000000000000000079616d3000000000000000000000000076657465616d000000294c0000000000aaaaaaaaaaaa000000000000aaaaaaaaaa0000000000000000007000000070000000a0000000415544495400000000000000000000000000000000000000000000000000000008000000000000000400000000000000"]}, 0x1a8) [ 2070.068148] kernel msg: ebtables bug: please report to author: bad policy [ 2070.078826] kernel msg: ebtables bug: please report to author: bad policy [ 2070.139788] kernel msg: ebtables bug: please report to author: bad policy 21:15:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x0, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) openat(0xffffffffffffffff, 0x0, 0x800, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'bond_slave_0\x00'}, 0x18) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) 21:15:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2070.281588] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2070.318493] xt_AUDIT: Audit type out of range (valid range: 0..2) 21:15:08 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2070.419280] kernel msg: ebtables bug: please report to author: bad policy 21:15:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2070.506292] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2070.507998] kernel msg: ebtables bug: please report to author: bad policy [ 2070.536498] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 21:15:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc010643a, &(0x7f0000000080)={0x200000000000000}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x44000, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000040)={0x0, 0x1, [@dev={[], 0xc}]}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a8) 21:15:08 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2070.711624] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:08 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) openat(0xffffffffffffffff, 0x0, 0x800, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'bond_slave_0\x00'}, 0x18) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) [ 2070.769256] kernel msg: ebtables bug: please report to author: bad policy [ 2070.794031] xt_AUDIT: Audit type out of range (valid range: 0..2) 21:15:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x0, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x0, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2070.847870] kernel msg: ebtables bug: please report to author: bad policy [ 2070.971290] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2071.019359] kernel msg: ebtables bug: please report to author: bad policy [ 2071.028352] IPVS: stopping master sync thread 25402 ... 21:15:08 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2071.165285] kernel msg: ebtables bug: please report to author: bad policy 21:15:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x0, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2071.282883] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2071.305449] device bridge_slave_1 left promiscuous mode [ 2071.322560] bridge0: port 2(bridge_slave_1) entered disabled state 21:15:09 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2071.364212] kernel msg: ebtables bug: please report to author: bad policy 21:15:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2071.417233] device bridge_slave_0 left promiscuous mode [ 2071.428808] bridge0: port 1(bridge_slave_0) entered disabled state [ 2071.511610] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:09 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x200, 0x0) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000180)=0xaa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000200)=0x2ec0000000) ioctl$KVM_RUN(r3, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) 21:15:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80)=[{{&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/64, 0x40}, {&(0x7f0000000200)=""/40, 0x28}], 0x2, &(0x7f0000000280)=""/127, 0x7f}, 0x7}, {{&(0x7f00000003c0)=@nl=@unspec, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/215, 0xd7}, {&(0x7f0000000480)}, {&(0x7f00000006c0)=""/164, 0xa4}, {&(0x7f0000000780)=""/18, 0x12}, {&(0x7f00000007c0)=""/230, 0xe6}, {&(0x7f00000008c0)=""/23, 0x17}, {&(0x7f0000000900)=""/56, 0x38}], 0x7}}, {{&(0x7f00000009c0)=@isdn, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/165, 0xa5}, {&(0x7f0000001b00)}], 0x3, &(0x7f0000001b80)=""/19, 0x13}, 0x8001}, {{0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/136, 0x88}, {&(0x7f0000001cc0)=""/34, 0x22}, {&(0x7f0000001d00)=""/20, 0x14}], 0x4, &(0x7f0000001d80)=""/92, 0x5c}, 0xffffffffffff0001}, {{&(0x7f0000001e00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000002140)=[{&(0x7f0000001e80)=""/157, 0x9d}, {&(0x7f0000001f40)=""/215, 0xd7}, {&(0x7f0000002040)}, {&(0x7f0000002080)=""/73, 0x49}, {&(0x7f0000002100)=""/41, 0x29}], 0x5, &(0x7f00000021c0)=""/159, 0x9f}, 0x1}, {{&(0x7f0000002280)=@nfc, 0x80, &(0x7f0000002440)=[{&(0x7f0000002300)}, {&(0x7f0000002340)=""/8, 0x8}, {&(0x7f0000002380)=""/189, 0xbd}], 0x3}, 0xffffffffffff8001}, {{&(0x7f0000002480)=@pppol2tpv3in6, 0x80, &(0x7f0000002900)=[{&(0x7f0000002500)=""/126, 0x7e}, {&(0x7f0000002580)=""/250, 0xfa}, {&(0x7f0000002680)=""/203, 0xcb}, {&(0x7f0000002780)=""/252, 0xfc}, {&(0x7f0000002880)=""/72, 0x48}], 0x5, &(0x7f0000002980)=""/224, 0xe0}, 0x40}], 0x7, 0x20, &(0x7f0000002c40)={0x0, 0x1c9c380}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000002c80)=0x1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0xfffffffffffeffff, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) [ 2071.635585] kernel msg: ebtables bug: please report to author: bad policy 21:15:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x0, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2071.709098] kernel msg: ebtables bug: please report to author: bad policy [ 2071.722326] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2071.875895] net_ratelimit: 32 callbacks suppressed [ 2071.875904] protocol 88fb is buggy, dev hsr_slave_0 [ 2071.886158] protocol 88fb is buggy, dev hsr_slave_1 21:15:09 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2072.039524] device hsr_slave_1 left promiscuous mode [ 2072.055108] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80)=[{{&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/64, 0x40}, {&(0x7f0000000200)=""/40, 0x28}], 0x2, &(0x7f0000000280)=""/127, 0x7f}, 0x7}, {{&(0x7f00000003c0)=@nl=@unspec, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)=""/215, 0xd7}, {&(0x7f0000000480)}, {&(0x7f00000006c0)=""/164, 0xa4}, {&(0x7f0000000780)=""/18, 0x12}, {&(0x7f00000007c0)=""/230, 0xe6}, {&(0x7f00000008c0)=""/23, 0x17}, {&(0x7f0000000900)=""/56, 0x38}], 0x7}}, {{&(0x7f00000009c0)=@isdn, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/165, 0xa5}, {&(0x7f0000001b00)}], 0x3, &(0x7f0000001b80)=""/19, 0x13}, 0x8001}, {{0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001bc0)=""/37, 0x25}, {&(0x7f0000001c00)=""/136, 0x88}, {&(0x7f0000001cc0)=""/34, 0x22}, {&(0x7f0000001d00)=""/20, 0x14}], 0x4, &(0x7f0000001d80)=""/92, 0x5c}, 0xffffffffffff0001}, {{&(0x7f0000001e00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000002140)=[{&(0x7f0000001e80)=""/157, 0x9d}, {&(0x7f0000001f40)=""/215, 0xd7}, {&(0x7f0000002040)}, {&(0x7f0000002080)=""/73, 0x49}, {&(0x7f0000002100)=""/41, 0x29}], 0x5, &(0x7f00000021c0)=""/159, 0x9f}, 0x1}, {{&(0x7f0000002280)=@nfc, 0x80, &(0x7f0000002440)=[{&(0x7f0000002300)}, {&(0x7f0000002340)=""/8, 0x8}, {&(0x7f0000002380)=""/189, 0xbd}], 0x3}, 0xffffffffffff8001}, {{&(0x7f0000002480)=@pppol2tpv3in6, 0x80, &(0x7f0000002900)=[{&(0x7f0000002500)=""/126, 0x7e}, {&(0x7f0000002580)=""/250, 0xfa}, {&(0x7f0000002680)=""/203, 0xcb}, {&(0x7f0000002780)=""/252, 0xfc}, {&(0x7f0000002880)=""/72, 0x48}], 0x5, &(0x7f0000002980)=""/224, 0xe0}, 0x40}], 0x7, 0x20, &(0x7f0000002c40)={0x0, 0x1c9c380}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000002c80)=0x1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0xfffffffffffeffff, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) [ 2072.084286] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2072.124813] device hsr_slave_0 left promiscuous mode 21:15:09 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2072.248734] team0 (unregistering): Port device team_slave_1 removed [ 2072.257753] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2072.332414] team0 (unregistering): Port device team_slave_0 removed [ 2072.382065] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2072.439226] protocol 88fb is buggy, dev hsr_slave_0 [ 2072.444595] protocol 88fb is buggy, dev hsr_slave_1 [ 2072.473827] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2072.592925] bond0 (unregistering): Released all slaves 21:15:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:10 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) 21:15:10 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) 21:15:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x0, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:10 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2072.805925] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2072.930652] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:10 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2073.148705] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2073.180723] kernel msg: ebtables bug: please report to author: bad policy 21:15:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x0, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2073.192789] kernel msg: ebtables bug: please report to author: bad policy 21:15:10 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) 21:15:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x0, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2073.476041] protocol 88fb is buggy, dev hsr_slave_0 [ 2073.481522] protocol 88fb is buggy, dev hsr_slave_1 [ 2073.506132] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2073.795837] protocol 88fb is buggy, dev hsr_slave_0 [ 2073.795916] protocol 88fb is buggy, dev hsr_slave_0 [ 2073.801226] protocol 88fb is buggy, dev hsr_slave_1 [ 2073.806351] protocol 88fb is buggy, dev hsr_slave_1 21:15:11 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x0, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:11 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x0, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a8) 21:15:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a8) [ 2074.339030] kernel msg: ebtables bug: please report to author: bad policy [ 2074.347698] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2074.438380] kernel msg: ebtables bug: please report to author: bad policy 21:15:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a8) 21:15:12 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2074.671364] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x0, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x0, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2074.837161] kernel msg: ebtables bug: please report to author: bad policy [ 2074.938772] kernel msg: ebtables bug: please report to author: bad policy [ 2075.001509] IPVS: ftp: loaded support on port[0] = 21 [ 2075.333874] chnl_net:caif_netlink_parms(): no params data found [ 2075.394479] bridge0: port 1(bridge_slave_0) entered blocking state [ 2075.409370] bridge0: port 1(bridge_slave_0) entered disabled state [ 2075.421282] device bridge_slave_0 entered promiscuous mode [ 2075.434061] bridge0: port 2(bridge_slave_1) entered blocking state [ 2075.444675] bridge0: port 2(bridge_slave_1) entered disabled state [ 2075.459927] device bridge_slave_1 entered promiscuous mode [ 2075.509230] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2075.523482] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2075.573191] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2075.583517] team0: Port device team_slave_0 added [ 2075.617049] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2075.626607] team0: Port device team_slave_1 added [ 2075.633041] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2075.645230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2075.763170] device hsr_slave_0 entered promiscuous mode [ 2075.826168] device hsr_slave_1 entered promiscuous mode [ 2075.886410] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2075.893429] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2075.922390] bridge0: port 2(bridge_slave_1) entered blocking state [ 2075.928860] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2075.935509] bridge0: port 1(bridge_slave_0) entered blocking state [ 2075.941920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2076.021457] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2076.034338] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2076.053558] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2076.075950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2076.083984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2076.092180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2076.100884] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2076.120718] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2076.128232] 8021q: adding VLAN 0 to HW filter on device team0 [ 2076.139059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2076.147661] bridge0: port 1(bridge_slave_0) entered blocking state [ 2076.154040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2076.171021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2076.178899] bridge0: port 2(bridge_slave_1) entered blocking state [ 2076.185251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2076.207566] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2076.215574] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2076.224461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2076.233560] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2076.245660] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2076.264603] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2076.275262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2076.295553] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2076.310019] 8021q: adding VLAN 0 to HW filter on device batadv0 21:15:14 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a8) 21:15:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:14 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x0, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x800, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000240)) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) setsockopt$inet_udp_int(r2, 0x11, 0x0, &(0x7f0000000380)=0x10000, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000002c0)={0xff, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e23, 0x4, 'sh\x00', 0x5, 0xfffffffffffffffe, 0x74}, 0x2c) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0xfffffffffffffc4e, &(0x7f0000000040)=[@in={0x2, 0x4e24, @loopback}]}, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x10002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xffffffffffffffa2) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) shutdown(r3, 0xfbe58290f60b9618) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000005c0)={0x0, 0x0, @pic={0x56fa, 0x10001, 0x3, 0x0, 0x7fff, 0x8, 0x3ff, 0x6, 0x1, 0xffff, 0x6, 0x10001000, 0x80000000, 0x6, 0x80, 0x1ac}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0xffffffffffffffff, 0x2000, 0x2f57, 0x25b, 0x8, 0x5, 0x80, 0x80, 0x80000001}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) [ 2076.345084] kernel msg: ebtables bug: please report to author: bad policy [ 2076.354575] kernel msg: ebtables bug: please report to author: bad policy 21:15:14 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2076.404486] kernel msg: ebtables bug: please report to author: bad policy [ 2076.422473] kernel msg: ebtables bug: please report to author: bad policy [ 2076.431580] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a8) [ 2076.480683] kernel msg: ebtables bug: please report to author: bad policy 21:15:14 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a8) [ 2076.653941] kernel msg: ebtables bug: please report to author: bad policy 21:15:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a8) [ 2076.705145] kernel msg: ebtables bug: please report to author: bad policy [ 2076.736074] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2076.746785] kernel msg: ebtables bug: please report to author: bad policy [ 2076.776961] kernel msg: ebtables bug: please report to author: bad policy 21:15:14 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:14 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x0, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2076.973148] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2076.986790] kernel msg: ebtables bug: please report to author: bad policy 21:15:14 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2077.048108] kernel msg: ebtables bug: please report to author: bad policy [ 2077.070869] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2077.126332] kernel msg: ebtables bug: please report to author: bad policy 21:15:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x800, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000240)) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) setsockopt$inet_udp_int(r2, 0x11, 0x0, &(0x7f0000000380)=0x10000, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000002c0)={0xff, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e23, 0x4, 'sh\x00', 0x5, 0xfffffffffffffffe, 0x74}, 0x2c) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0xfffffffffffffc4e, &(0x7f0000000040)=[@in={0x2, 0x4e24, @loopback}]}, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x10002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xffffffffffffffa2) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) shutdown(r3, 0xfbe58290f60b9618) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000005c0)={0x0, 0x0, @pic={0x56fa, 0x10001, 0x3, 0x0, 0x7fff, 0x8, 0x3ff, 0x6, 0x1, 0xffff, 0x6, 0x10001000, 0x80000000, 0x6, 0x80, 0x1ac}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0xffffffffffffffff, 0x2000, 0x2f57, 0x25b, 0x8, 0x5, 0x80, 0x80, 0x80000001}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) 21:15:14 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:14 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000030000000000000000006e72300000000000000000000000000079616d3000000000000000000000000079616d3000000000000000000000000076657465616d000000294c0000000000aaaaaaaaaaaa000000000000aaaaaaaaaa0000000000e2ff00007000000070000000a0000000415544495418000000000000000000000000000000000000000000000000000008000000000000000400000000000000"]}, 0x1a8) 21:15:14 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x0, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:15 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2077.354430] kernel msg: ebtables bug: please report to author: bad policy [ 2077.370127] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2077.374750] kernel msg: ebtables bug: please report to author: bad policy [ 2077.389468] kernel msg: ebtables bug: please report to author: bad policy 21:15:15 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2077.515221] kernel msg: ebtables bug: please report to author: bad policy 21:15:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a8) [ 2077.573219] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2077.582977] kernel msg: ebtables bug: please report to author: bad policy 21:15:15 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2077.614668] kernel msg: ebtables bug: please report to author: bad policy [ 2077.627272] kernel msg: ebtables bug: please report to author: bad policy [ 2077.648390] net_ratelimit: 26 callbacks suppressed [ 2077.648399] protocol 88fb is buggy, dev hsr_slave_0 [ 2077.658552] protocol 88fb is buggy, dev hsr_slave_1 [ 2077.682619] device bridge_slave_1 left promiscuous mode [ 2077.706171] bridge0: port 2(bridge_slave_1) entered disabled state [ 2077.752986] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2077.798005] device bridge_slave_0 left promiscuous mode [ 2077.798883] kernel msg: ebtables bug: please report to author: bad policy [ 2077.803581] bridge0: port 1(bridge_slave_0) entered disabled state [ 2077.955998] protocol 88fb is buggy, dev hsr_slave_0 [ 2077.956545] protocol 88fb is buggy, dev hsr_slave_0 [ 2077.961138] protocol 88fb is buggy, dev hsr_slave_1 [ 2077.966843] protocol 88fb is buggy, dev hsr_slave_1 [ 2078.035818] protocol 88fb is buggy, dev hsr_slave_0 [ 2078.041021] protocol 88fb is buggy, dev hsr_slave_1 [ 2078.082510] device hsr_slave_1 left promiscuous mode [ 2078.115804] protocol 88fb is buggy, dev hsr_slave_0 [ 2078.121029] protocol 88fb is buggy, dev hsr_slave_1 [ 2078.142798] device hsr_slave_0 left promiscuous mode [ 2078.211455] team0 (unregistering): Port device team_slave_1 removed [ 2078.246752] team0 (unregistering): Port device team_slave_0 removed 21:15:15 executing program 2: socketpair$unix(0x1, 0x40000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x84, 0x7c, &(0x7f0000000000), &(0x7f0000000040)=0x9b) close(r2) close(r1) 21:15:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x0, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a8) 21:15:15 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:15 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2078.262182] bond0 (unregistering): Releasing backup interface bond_slave_1 21:15:16 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2078.312128] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2078.348266] bond0 (unregistering): Releasing backup interface bond_slave_0 21:15:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a8) [ 2078.380394] kernel msg: ebtables bug: please report to author: bad policy 21:15:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x1a8) [ 2078.460273] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0}, 0x1a8) [ 2078.529803] kernel msg: ebtables bug: please report to author: bad policy 21:15:16 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x0, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2078.677237] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2078.704934] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2078.755257] bond0 (unregistering): Released all slaves 21:15:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2078.899702] kernel msg: ebtables bug: please report to author: bad policy 21:15:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket(0x10, 0x2, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3ab85f04000000d2eb", 0x10) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000040)={0x14, 0x0, 0x0, 0x0, 0x0, {0xfffffff0}}, 0x333}}, 0x0) 21:15:16 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0}, 0x1a8) 21:15:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x0, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0}, 0x1a8) 21:15:16 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2078.977015] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2078.996316] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2079.008754] kernel msg: ebtables bug: please report to author: bad policy 21:15:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[]}, 0x78) [ 2079.109057] kernel msg: ebtables bug: please report to author: Wrong len argument [ 2079.172709] kernel msg: ebtables bug: please report to author: bad policy [ 2079.182349] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2079.201718] kernel msg: ebtables bug: please report to author: bad policy 21:15:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x9, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 21:15:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:16 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[]}, 0x78) [ 2079.219712] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 2079.256144] kernel msg: ebtables bug: please report to author: bad policy 21:15:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x0, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:17 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2079.324231] kernel msg: ebtables bug: please report to author: bad policy [ 2079.354698] kernel msg: ebtables bug: please report to author: Entries_size never zero 21:15:17 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x801, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xd) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xffa8) ioctl$TCFLSH(r0, 0x5437, 0x0) 21:15:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[]}, 0x78) [ 2079.436923] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2079.440442] kernel msg: ebtables bug: please report to author: bad policy 21:15:17 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:17 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2079.541840] kernel msg: ebtables bug: please report to author: Entries_size never zero 21:15:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB]}, 0x78) [ 2079.624180] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2079.654906] kernel msg: ebtables bug: please report to author: bad policy 21:15:17 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2079.677013] kernel msg: ebtables bug: please report to author: bad policy 21:15:17 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB]}, 0x78) [ 2079.719536] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 2079.753409] kernel msg: ebtables bug: please report to author: bad policy 21:15:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x0, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x200000, 0x100082) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)) [ 2079.794428] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2079.812122] kernel msg: ebtables bug: please report to author: bad policy 21:15:17 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB]}, 0x78) 21:15:17 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2079.838131] kernel msg: ebtables bug: please report to author: Entries_size never zero 21:15:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000)='\x00', 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x400000000000001) [ 2079.988787] kernel msg: ebtables bug: please report to author: bad policy [ 2080.005263] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 2080.018410] kernel msg: ebtables bug: please report to author: bad policy 21:15:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x98, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000"]}, 0x110) 21:15:17 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x0, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2080.047929] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2080.087315] kernel msg: ebtables bug: please report to author: bad policy 21:15:17 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x800000000003, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x2000000000000000]}, 0x2c) [ 2080.126611] kernel msg: ebtables bug: please report to author: entries_size too small 21:15:17 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x98, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000"]}, 0x110) 21:15:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2080.253383] kernel msg: ebtables bug: please report to author: bad policy [ 2080.265122] kernel msg: ebtables bug: please report to author: entries_size too small 21:15:17 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:18 executing program 2: [ 2080.303832] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:18 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x98, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000"]}, 0x110) 21:15:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2080.356435] kernel msg: ebtables bug: please report to author: bad policy 21:15:18 executing program 2: [ 2080.445171] kernel msg: ebtables bug: please report to author: entries_size too small [ 2080.470883] kernel msg: ebtables bug: please report to author: bad policy 21:15:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x0, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0xe4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000030000000000000000006e72300000000000000000000000000079616d3000000000000000000000000079616d3000000000000000000000000076657465616d000000294c0000000000aaaaaaaaaaaa00000000"]}, 0x15c) 21:15:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x0, 0x4, [@initdev, @multicast2, @multicast1, @empty]}, 0x20) [ 2080.489482] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2080.500727] kernel msg: ebtables bug: please report to author: bad policy 21:15:18 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:18 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2080.598085] kernel msg: ebtables bug: please report to author: entries_size too small 21:15:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0xe4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000030000000000000000006e72300000000000000000000000000079616d3000000000000000000000000079616d3000000000000000000000000076657465616d000000294c0000000000aaaaaaaaaaaa00000000"]}, 0x15c) 21:15:18 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, 0x0, 0x0) [ 2080.707965] kernel msg: ebtables bug: please report to author: bad policy 21:15:18 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2080.752560] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2080.772136] kernel msg: ebtables bug: please report to author: entries_size too small 21:15:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0xe4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000030000000000000000006e72300000000000000000000000000079616d3000000000000000000000000079616d3000000000000000000000000076657465616d000000294c0000000000aaaaaaaaaaaa00000000"]}, 0x15c) 21:15:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="020400000300600000000000fff55b4202938207d9fb3780398d5375000006007929301ee616d5c01843e06590080053c0e385472da7222a2bb401000000c3b542914c5e61eaa96fa9a1e8d1843e770afd6e9ef5837dbdeba97bc406eb04d1f087c0299c", 0x64, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002800)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)=""/107, 0x6b}], 0x1}}], 0x1, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) [ 2080.815282] kernel msg: ebtables bug: please report to author: bad policy [ 2080.889506] kernel msg: ebtables bug: please report to author: bad policy 21:15:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x0, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:18 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:18 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x10a, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x182) [ 2080.932693] kernel msg: ebtables bug: please report to author: entries_size too small [ 2080.967087] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:18 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2080.978220] kernel msg: ebtables bug: please report to author: bad policy 21:15:18 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2081.065035] kernel msg: ebtables bug: please report to author: entries_size too small 21:15:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x11d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x195) [ 2081.145916] kernel msg: ebtables bug: please report to author: bad policy [ 2081.156095] kernel msg: ebtables bug: please report to author: bad policy [ 2081.178068] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x0, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2081.209298] kernel msg: ebtables bug: please report to author: bad policy 21:15:18 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2081.296970] kernel msg: ebtables bug: please report to author: entries_size too small [ 2081.318833] kernel msg: ebtables bug: please report to author: bad policy [ 2081.463782] kernel msg: ebtables bug: please report to author: bad policy [ 2081.490876] kernel msg: ebtables bug: please report to author: bad policy 21:15:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) 21:15:19 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x11d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x195) 21:15:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:19 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x11d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x195) 21:15:19 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2081.944211] kernel msg: ebtables bug: please report to author: entries_size too small [ 2081.956606] kernel msg: ebtables bug: please report to author: bad policy [ 2081.973127] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2081.983081] kernel msg: ebtables bug: please report to author: bad policy 21:15:19 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x127, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x19f) [ 2082.098592] kernel msg: ebtables bug: please report to author: bad policy [ 2082.106717] kernel msg: ebtables bug: please report to author: entries_size too small [ 2082.126445] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:19 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:19 executing program 2: [ 2082.212264] kernel msg: ebtables bug: please report to author: bad policy 21:15:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:19 executing program 2: 21:15:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x127, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x19f) 21:15:19 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2082.256214] kernel msg: ebtables bug: please report to author: bad policy [ 2082.268757] kernel msg: ebtables bug: please report to author: entries_size too small [ 2082.271325] kernel msg: ebtables bug: please report to author: bad policy 21:15:20 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2082.393314] kernel msg: ebtables bug: please report to author: entries_size too small 21:15:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x127, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x19f) [ 2082.470730] kernel msg: ebtables bug: please report to author: bad policy 21:15:20 executing program 2: 21:15:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2082.526756] kernel msg: ebtables bug: please report to author: bad policy 21:15:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x12c, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a4) [ 2082.587418] kernel msg: ebtables bug: please report to author: entries_size too small [ 2082.615232] kernel msg: ebtables bug: please report to author: bad policy 21:15:20 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:20 executing program 2: 21:15:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x12c, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a4) [ 2082.803864] kernel msg: ebtables bug: please report to author: bad policy [ 2082.845881] net_ratelimit: 24 callbacks suppressed [ 2082.845891] protocol 88fb is buggy, dev hsr_slave_0 [ 2082.856093] protocol 88fb is buggy, dev hsr_slave_1 [ 2082.915887] protocol 88fb is buggy, dev hsr_slave_0 [ 2082.921262] protocol 88fb is buggy, dev hsr_slave_1 21:15:21 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:21 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:21 executing program 2: 21:15:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x0, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:21 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:21 executing program 2: [ 2083.765873] kernel msg: ebtables bug: please report to author: bad policy [ 2083.785878] kernel msg: ebtables bug: please report to author: bad policy 21:15:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x0, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x12c, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a4) 21:15:21 executing program 2: [ 2083.968625] kernel msg: ebtables bug: please report to author: bad policy 21:15:21 executing program 2: [ 2084.051731] IPVS: ftp: loaded support on port[0] = 21 21:15:21 executing program 2: [ 2084.088292] kernel msg: ebtables bug: please report to author: bad policy [ 2084.272996] IPVS: ftp: loaded support on port[0] = 21 [ 2084.310418] IPVS: ftp: loaded support on port[0] = 21 [ 2084.357366] chnl_net:caif_netlink_parms(): no params data found [ 2084.426957] bridge0: port 1(bridge_slave_0) entered blocking state [ 2084.433526] bridge0: port 1(bridge_slave_0) entered disabled state [ 2084.440737] device bridge_slave_0 entered promiscuous mode [ 2084.450854] bridge0: port 2(bridge_slave_1) entered blocking state [ 2084.457350] bridge0: port 2(bridge_slave_1) entered disabled state [ 2084.464631] device bridge_slave_1 entered promiscuous mode [ 2084.512012] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2084.542702] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2084.586534] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2084.593815] team0: Port device team_slave_0 added [ 2084.619018] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2084.627327] team0: Port device team_slave_1 added [ 2084.632511] chnl_net:caif_netlink_parms(): no params data found [ 2084.649960] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2084.666143] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2084.778001] device hsr_slave_0 entered promiscuous mode [ 2084.826319] device hsr_slave_1 entered promiscuous mode [ 2084.866190] bridge0: port 1(bridge_slave_0) entered blocking state [ 2084.872620] bridge0: port 1(bridge_slave_0) entered disabled state [ 2084.879899] device bridge_slave_0 entered promiscuous mode [ 2084.902341] chnl_net:caif_netlink_parms(): no params data found [ 2084.910940] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2084.919293] bridge0: port 2(bridge_slave_1) entered blocking state [ 2084.925646] bridge0: port 2(bridge_slave_1) entered disabled state [ 2084.933531] device bridge_slave_1 entered promiscuous mode [ 2084.964689] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2085.002489] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2085.029602] bridge0: port 1(bridge_slave_0) entered blocking state [ 2085.036315] bridge0: port 1(bridge_slave_0) entered disabled state [ 2085.043756] device bridge_slave_0 entered promiscuous mode [ 2085.052391] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2085.063596] bridge0: port 2(bridge_slave_1) entered blocking state [ 2085.073179] bridge0: port 2(bridge_slave_1) entered disabled state [ 2085.080819] device bridge_slave_1 entered promiscuous mode [ 2085.109898] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2085.130173] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2085.137860] team0: Port device team_slave_0 added [ 2085.145157] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2085.152603] team0: Port device team_slave_1 added [ 2085.158249] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2085.167879] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2085.185185] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2085.196704] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2085.210139] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2085.217654] team0: Port device team_slave_0 added [ 2085.226851] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2085.234575] team0: Port device team_slave_1 added [ 2085.297733] device hsr_slave_0 entered promiscuous mode [ 2085.366327] device hsr_slave_1 entered promiscuous mode [ 2085.450896] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2085.459797] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2085.467295] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2085.478619] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2085.599369] device hsr_slave_0 entered promiscuous mode [ 2085.626043] device hsr_slave_1 entered promiscuous mode [ 2085.740964] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2085.748411] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2085.764396] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2085.794964] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2085.806824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2085.817614] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2085.827628] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2085.838909] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2085.845025] 8021q: adding VLAN 0 to HW filter on device team0 [ 2085.855126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2085.862670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2085.907909] device bridge_slave_1 left promiscuous mode [ 2085.913475] bridge0: port 2(bridge_slave_1) entered disabled state [ 2085.966751] device bridge_slave_0 left promiscuous mode [ 2085.972234] bridge0: port 1(bridge_slave_0) entered disabled state [ 2086.018393] device bridge_slave_1 left promiscuous mode [ 2086.023928] bridge0: port 2(bridge_slave_1) entered disabled state [ 2086.077547] device bridge_slave_0 left promiscuous mode [ 2086.083256] bridge0: port 1(bridge_slave_0) entered disabled state [ 2086.127215] device bridge_slave_1 left promiscuous mode [ 2086.132709] bridge0: port 2(bridge_slave_1) entered disabled state [ 2086.177051] device bridge_slave_0 left promiscuous mode [ 2086.182596] bridge0: port 1(bridge_slave_0) entered disabled state [ 2086.440460] device hsr_slave_1 left promiscuous mode [ 2086.480797] device hsr_slave_0 left promiscuous mode [ 2086.551467] team0 (unregistering): Port device team_slave_1 removed [ 2086.563321] team0 (unregistering): Port device team_slave_0 removed [ 2086.577278] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2086.618018] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2086.687561] bond0 (unregistering): Released all slaves [ 2086.899577] device hsr_slave_1 left promiscuous mode [ 2086.942222] device hsr_slave_0 left promiscuous mode [ 2087.002913] team0 (unregistering): Port device team_slave_1 removed [ 2087.014488] team0 (unregistering): Port device team_slave_0 removed [ 2087.026353] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2087.093319] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2087.195315] bond0 (unregistering): Released all slaves [ 2087.328320] device hsr_slave_1 left promiscuous mode [ 2087.390673] device hsr_slave_0 left promiscuous mode [ 2087.451305] team0 (unregistering): Port device team_slave_1 removed [ 2087.462984] team0 (unregistering): Port device team_slave_0 removed [ 2087.474412] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2087.514120] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2087.613311] bond0 (unregistering): Released all slaves [ 2087.759273] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2087.769708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2087.777733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2087.785416] bridge0: port 1(bridge_slave_0) entered blocking state [ 2087.791862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2087.801373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2087.814975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2087.832903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2087.840133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2087.849032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2087.857155] bridge0: port 2(bridge_slave_1) entered blocking state [ 2087.863531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2087.874254] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2087.885962] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2087.893978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2087.902064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2087.912719] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2087.937802] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2087.945186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2087.953347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2087.960966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2087.968287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2087.976782] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2087.984583] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2087.998422] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2088.007658] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2088.013784] 8021q: adding VLAN 0 to HW filter on device team0 [ 2088.021246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2088.033467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2088.049413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2088.063272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2088.069763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2088.077663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2088.087308] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2088.094475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2088.103618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2088.111727] bridge0: port 1(bridge_slave_0) entered blocking state [ 2088.118156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2088.125585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2088.136018] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2088.144519] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2088.154520] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2088.161224] 8021q: adding VLAN 0 to HW filter on device team0 [ 2088.172383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2088.179393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2088.187211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2088.194209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2088.202662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2088.218644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2088.229611] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2088.236429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2088.243856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2088.252426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2088.261020] bridge0: port 2(bridge_slave_1) entered blocking state [ 2088.267549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2088.276182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2088.283525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2088.292035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2088.300044] bridge0: port 1(bridge_slave_0) entered blocking state [ 2088.306459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2088.313894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2088.323833] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2088.335442] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2088.347754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2088.355800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2088.363708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2088.372866] bridge0: port 2(bridge_slave_1) entered blocking state [ 2088.379336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2088.388938] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2088.399426] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2088.410287] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2088.417585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2088.418357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2088.437828] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2088.445589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2088.453855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2088.462211] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2088.475444] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2088.485512] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2088.497966] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2088.504919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2088.520169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2088.528670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2088.541400] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2088.551175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2088.572450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2088.578992] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:26 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:26 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:26 executing program 2: 21:15:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x0, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2088.592060] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2088.601879] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2088.637389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2088.645458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2088.664951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2088.669599] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:26 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:26 executing program 2: [ 2088.682556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2088.686343] kernel msg: ebtables bug: please report to author: bad policy [ 2088.693977] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2088.705905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2088.766976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2088.790212] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2088.799127] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2088.808669] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2088.822169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2088.831466] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2088.840936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2088.850100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2088.875451] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2088.889630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2088.898922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2088.910547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2088.968684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2088.976798] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2088.982914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2089.100542] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2089.114504] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2089.153938] kernel msg: ebtables bug: please report to author: entries_size too small [ 2089.200365] kernel msg: ebtables bug: please report to author: bad policy [ 2089.209474] kernel msg: ebtables bug: please report to author: bad policy 21:15:26 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:26 executing program 2: 21:15:26 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x0, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x12e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a6) 21:15:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:26 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2089.295573] kernel msg: ebtables bug: please report to author: entries_size too small [ 2089.319645] kernel msg: ebtables bug: please report to author: bad policy 21:15:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x10009) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000000), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='maps\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0x387, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8001, 0xfffffffffffffff8, 0x0, 0x0, 0x59}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) syz_open_dev$usbmon(0x0, 0xf7f6, 0x100) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000100)) 21:15:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x12e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a6) [ 2089.367227] kernel msg: ebtables bug: please report to author: bad policy [ 2089.406442] kernel msg: ebtables bug: please report to author: bad policy 21:15:27 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2089.418805] kernel msg: ebtables bug: please report to author: bad policy [ 2089.456403] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:27 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2089.512532] kernel msg: ebtables bug: please report to author: bad policy 21:15:27 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x0, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x12e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a6) [ 2089.561115] kernel msg: ebtables bug: please report to author: entries_size too small 21:15:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="3900000013000b0468fe0700000000000e00ff3f03000000450001070000001419001a0004005e0007000a000200ed0800005d14a4e91ee438", 0x39}], 0x1) [ 2089.611787] kernel msg: ebtables bug: please report to author: bad policy [ 2089.619048] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:27 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:27 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2089.683050] kernel msg: ebtables bug: please report to author: bad policy 21:15:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2089.735260] kernel msg: ebtables bug: please report to author: entries_size too small [ 2089.748765] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x12f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a7) [ 2089.809040] kernel msg: ebtables bug: please report to author: bad policy 21:15:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:27 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:27 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2089.855196] kernel msg: ebtables bug: please report to author: bad policy 21:15:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x12f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x1a7) [ 2089.902369] kernel msg: ebtables bug: please report to author: entries_size too small [ 2089.961441] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2089.998238] kernel msg: ebtables bug: please report to author: bad policy 21:15:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x0, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2090.003436] kernel msg: ebtables bug: please report to author: bad policy 21:15:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:27 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2090.033326] kernel msg: ebtables bug: please report to author: entries_size too small [ 2090.041479] kernel msg: ebtables bug: please report to author: bad policy 21:15:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x1, 0x12f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000030000000000000000006e72300000000000000000000000000079616d3000000000000000000000000079616d3000000000000000000000000076657465616d000000294c0000000000aaaaaaaaaaaa000000000000aaaaaaaaaa0000000000e2ff00007000000070000000a00000004155444954180000000000000000000000000000000000000000000000000000080000000000000004000000000000"]}, 0x1a7) 21:15:27 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2090.205295] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2090.235577] kernel msg: ebtables bug: please report to author: entries_size too small 21:15:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x0, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:27 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2090.254485] kernel msg: ebtables bug: please report to author: bad policy 21:15:28 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000003c0), 0xed5f0dd4, 0x0, 0x0, 0x184) shutdown(r0, 0x400000000000001) 21:15:28 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2090.405858] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:28 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2090.468512] kernel msg: ebtables bug: please report to author: bad policy [ 2090.470647] kernel msg: ebtables bug: please report to author: bad policy 21:15:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0x0, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:28 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)='4', 0x1}], 0x1}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000003c0), 0xed5f0dd4, 0x0, 0x0, 0x184) shutdown(r0, 0x400000000000001) [ 2090.635893] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") getsockopt(0xffffffffffffffff, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2090.721815] kernel msg: ebtables bug: please report to author: bad policy 21:15:28 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2090.821445] kernel msg: ebtables bug: please report to author: bad policy 21:15:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x0, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0x0, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2090.972376] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2091.060198] kernel msg: ebtables bug: please report to author: bad policy [ 2091.092872] kernel msg: ebtables bug: please report to author: bad policy 21:15:29 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:29 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:29 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0x0, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2091.755400] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:29 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2091.797099] kernel msg: ebtables bug: please report to author: bad policy 21:15:29 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2091.855247] kernel msg: ebtables bug: please report to author: bad policy 21:15:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2091.967235] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:29 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2092.075557] kernel msg: ebtables bug: please report to author: bad policy [ 2092.124253] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2092.137783] kernel msg: ebtables bug: please report to author: bad policy [ 2092.158936] IPVS: ftp: loaded support on port[0] = 21 [ 2092.330041] chnl_net:caif_netlink_parms(): no params data found [ 2092.366870] bridge0: port 1(bridge_slave_0) entered blocking state [ 2092.373362] bridge0: port 1(bridge_slave_0) entered disabled state [ 2092.381007] device bridge_slave_0 entered promiscuous mode [ 2092.389631] bridge0: port 2(bridge_slave_1) entered blocking state [ 2092.396267] bridge0: port 2(bridge_slave_1) entered disabled state [ 2092.403378] device bridge_slave_1 entered promiscuous mode [ 2092.428070] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2092.438945] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2092.461919] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2092.469944] team0: Port device team_slave_0 added [ 2092.476254] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2092.484006] team0: Port device team_slave_1 added [ 2092.489944] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2092.497473] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2092.558713] device hsr_slave_0 entered promiscuous mode [ 2092.596114] device hsr_slave_1 entered promiscuous mode [ 2092.639866] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2092.647165] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2092.665130] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2092.709946] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2092.720166] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2092.730282] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2092.737228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2092.744245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2092.754001] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2092.760665] 8021q: adding VLAN 0 to HW filter on device team0 [ 2092.769878] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2092.777526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2092.785524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2092.793496] bridge0: port 1(bridge_slave_0) entered blocking state [ 2092.799914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2092.808065] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2092.818765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2092.826800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2092.834789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2092.844136] bridge0: port 2(bridge_slave_1) entered blocking state [ 2092.850582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2092.862171] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2092.873483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2092.880907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2092.889480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2092.910023] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2092.917353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2092.925340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2092.937014] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2092.948905] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2092.956532] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2092.963841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2092.972795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2092.980993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2092.989164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2092.999459] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2093.011681] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2093.022157] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2093.028736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2093.036643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2093.044273] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2093.061617] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2093.072632] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2093.102899] kernel msg: ebtables bug: please report to author: bad policy 21:15:30 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:30 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x0, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:30 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:30 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2093.111886] kernel msg: ebtables bug: please report to author: bad policy 21:15:30 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:30 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2093.177829] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2093.186193] kernel msg: ebtables bug: please report to author: bad policy [ 2093.200869] kernel msg: ebtables bug: please report to author: bad policy 21:15:30 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:30 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2093.223898] kernel msg: ebtables bug: please report to author: bad policy [ 2093.246787] kernel msg: ebtables bug: please report to author: bad policy 21:15:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:31 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x0, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2093.348185] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2093.381143] kernel msg: ebtables bug: please report to author: bad policy 21:15:31 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2093.454808] kernel msg: ebtables bug: please report to author: bad policy [ 2093.481869] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:31 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:31 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:31 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2093.506460] kernel msg: ebtables bug: please report to author: bad policy 21:15:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2093.581638] kernel msg: ebtables bug: please report to author: bad policy 21:15:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2093.632570] kernel msg: ebtables bug: please report to author: bad policy 21:15:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x0, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:31 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:31 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2093.718177] device bridge_slave_1 left promiscuous mode [ 2093.723788] bridge0: port 2(bridge_slave_1) entered disabled state [ 2093.739925] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2093.773876] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:31 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2093.815290] kernel msg: ebtables bug: please report to author: bad policy [ 2093.823688] device bridge_slave_0 left promiscuous mode [ 2093.832283] bridge0: port 1(bridge_slave_0) entered disabled state [ 2093.833613] kernel msg: ebtables bug: please report to author: bad policy 21:15:31 executing program 3: r0 = socket(0x0, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2093.888117] kernel msg: ebtables bug: please report to author: bad policy 21:15:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:31 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x0, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2093.975030] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:31 executing program 3: r0 = socket(0x40000000015, 0x0, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2094.098975] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2094.236173] device hsr_slave_1 left promiscuous mode [ 2094.293767] device hsr_slave_0 left promiscuous mode [ 2094.341751] team0 (unregistering): Port device team_slave_1 removed [ 2094.359258] team0 (unregistering): Port device team_slave_0 removed [ 2094.373412] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2094.443018] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2094.525013] bond0 (unregistering): Released all slaves [ 2094.562209] kernel msg: ebtables bug: please report to author: bad policy 21:15:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:32 executing program 3: socket(0x40000000015, 0x805, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:32 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x0, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:32 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2094.685091] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2094.702976] kernel msg: ebtables bug: please report to author: bad policy 21:15:32 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:32 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x0, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2094.754217] kernel msg: ebtables bug: please report to author: bad policy [ 2094.755008] kernel msg: ebtables bug: please report to author: bad policy [ 2094.781157] kernel msg: ebtables bug: please report to author: bad policy 21:15:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:32 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2094.856570] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:32 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x0, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2094.953944] kernel msg: ebtables bug: please report to author: bad policy 21:15:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:32 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2094.994356] kernel msg: ebtables bug: please report to author: bad policy [ 2095.018785] kernel msg: ebtables bug: please report to author: bad policy 21:15:32 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:32 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2095.050744] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2095.116637] kernel msg: ebtables bug: please report to author: bad policy [ 2095.139224] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:32 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:32 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2095.203228] kernel msg: ebtables bug: please report to author: bad policy 21:15:32 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2095.277863] kernel msg: ebtables bug: please report to author: bad policy [ 2095.288916] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:33 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(0x0, 0x102) 21:15:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:33 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, 0x0) 21:15:33 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2095.449260] kernel msg: ebtables bug: please report to author: bad policy [ 2095.449280] kernel msg: ebtables bug: please report to author: bad policy [ 2095.469747] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2095.488127] kernel msg: ebtables bug: please report to author: bad policy 21:15:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:33 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:33 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2095.666940] kernel msg: ebtables bug: please report to author: bad policy [ 2095.684802] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2095.729431] kernel msg: ebtables bug: please report to author: bad policy 21:15:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(0x0, 0x102) 21:15:33 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:33 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:33 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2095.876816] kernel msg: ebtables bug: please report to author: bad policy 21:15:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:33 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2095.918468] kernel msg: ebtables bug: please report to author: bad policy [ 2095.937045] kernel msg: ebtables bug: please report to author: bad policy 21:15:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:33 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c12") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2096.074048] kernel msg: ebtables bug: please report to author: bad policy [ 2096.099553] kernel msg: ebtables bug: please report to author: bad policy 21:15:33 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(0x0, 0x102) [ 2096.148095] kernel msg: ebtables bug: please report to author: bad policy 21:15:33 executing program 3: getsockopt(0xffffffffffffffff, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c12") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2096.292170] kernel msg: ebtables bug: please report to author: bad policy [ 2096.326753] kernel msg: ebtables bug: please report to author: bad policy [ 2096.347393] kernel msg: ebtables bug: please report to author: bad policy 21:15:34 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:34 executing program 3: getsockopt(0xffffffffffffffff, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:34 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c12") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x0) 21:15:34 executing program 3: getsockopt(0xffffffffffffffff, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2097.017759] kernel msg: ebtables bug: please report to author: bad policy [ 2097.018646] kernel msg: ebtables bug: please report to author: bad policy [ 2097.056348] kernel msg: ebtables bug: please report to author: bad policy 21:15:34 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2097.105559] kernel msg: ebtables bug: please report to author: bad policy 21:15:34 executing program 3: r0 = socket(0x0, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 2097.192058] kernel msg: ebtables bug: please report to author: bad policy [ 2097.384849] IPVS: ftp: loaded support on port[0] = 21 [ 2097.604944] chnl_net:caif_netlink_parms(): no params data found [ 2097.655474] bridge0: port 1(bridge_slave_0) entered blocking state [ 2097.662082] bridge0: port 1(bridge_slave_0) entered disabled state [ 2097.669532] device bridge_slave_0 entered promiscuous mode [ 2097.677417] bridge0: port 2(bridge_slave_1) entered blocking state [ 2097.683860] bridge0: port 2(bridge_slave_1) entered disabled state [ 2097.691670] device bridge_slave_1 entered promiscuous mode [ 2097.716065] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2097.725428] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2097.744859] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2097.752355] team0: Port device team_slave_0 added [ 2097.757894] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2097.765102] team0: Port device team_slave_1 added [ 2097.771435] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2097.779063] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2097.848780] device hsr_slave_0 entered promiscuous mode [ 2097.889845] device hsr_slave_1 entered promiscuous mode [ 2097.975650] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2097.982827] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2098.017624] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2098.070504] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2098.079729] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2098.089944] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2098.096631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2098.103654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2098.114138] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2098.121298] 8021q: adding VLAN 0 to HW filter on device team0 [ 2098.130662] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2098.137926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2098.146341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2098.153971] bridge0: port 1(bridge_slave_0) entered blocking state [ 2098.160427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2098.170411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2098.181499] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2098.188786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2098.197189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2098.205332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2098.213261] bridge0: port 2(bridge_slave_1) entered blocking state [ 2098.219678] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2098.227967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2098.248676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2098.255911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2098.266699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2098.273658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2098.282880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2098.292280] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2098.309899] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2098.317112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2098.324940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2098.335232] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2098.345571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2098.352745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2098.363507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2098.371156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2098.378942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2098.393719] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2098.400341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2098.413679] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2098.424930] 8021q: adding VLAN 0 to HW filter on device batadv0 21:15:36 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:36 executing program 3: r0 = socket(0x0, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 2098.473280] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2098.536285] kernel msg: ebtables bug: please report to author: bad policy [ 2098.574920] kernel msg: ebtables bug: please report to author: bad policy 21:15:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:36 executing program 3: r0 = socket(0x0, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a0") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2098.594776] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2098.624516] kernel msg: ebtables bug: please report to author: bad policy [ 2098.675644] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2098.713175] kernel msg: ebtables bug: please report to author: bad policy 21:15:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a0") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2098.749159] kernel msg: ebtables bug: please report to author: bad policy [ 2098.759638] kernel msg: ebtables bug: please report to author: bad policy 21:15:36 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:36 executing program 3: r0 = socket(0x40000000015, 0x0, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2098.796805] device bridge_slave_1 left promiscuous mode [ 2098.802446] bridge0: port 2(bridge_slave_1) entered disabled state 21:15:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 2098.887456] device bridge_slave_0 left promiscuous mode [ 2098.909430] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2098.914628] bridge0: port 1(bridge_slave_0) entered disabled state 21:15:36 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2098.944564] kernel msg: ebtables bug: please report to author: bad policy [ 2098.979915] kernel msg: ebtables bug: please report to author: bad policy [ 2099.004755] kernel msg: ebtables bug: please report to author: bad policy [ 2099.021637] kernel msg: ebtables bug: please report to author: bad policy 21:15:36 executing program 3: r0 = socket(0x40000000015, 0x0, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2099.047824] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:36 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:36 executing program 3: r0 = socket(0x40000000015, 0x0, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:36 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2099.182854] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2099.230728] device hsr_slave_1 left promiscuous mode 21:15:36 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2099.296799] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2099.318609] device hsr_slave_0 left promiscuous mode [ 2099.381582] team0 (unregistering): Port device team_slave_1 removed [ 2099.394879] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2099.422525] team0 (unregistering): Port device team_slave_0 removed [ 2099.442814] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2099.481944] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2099.583204] bond0 (unregistering): Released all slaves 21:15:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a0") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:37 executing program 3: socket(0x40000000015, 0x805, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(0x0, 0x102) 21:15:37 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2099.715210] kernel msg: ebtables bug: please report to author: bad policy [ 2099.751401] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2099.766361] kernel msg: ebtables bug: please report to author: bad policy 21:15:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x0, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:37 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:37 executing program 3: socket(0x40000000015, 0x805, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2099.810566] kernel msg: ebtables bug: please report to author: bad policy [ 2099.886345] kernel msg: ebtables bug: please report to author: bad policy 21:15:37 executing program 3: socket(0x40000000015, 0x805, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2099.935354] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2099.947008] kernel msg: ebtables bug: please report to author: bad policy 21:15:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(0x0, 0x102) 21:15:37 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x0, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2100.078293] kernel msg: ebtables bug: please report to author: bad policy 21:15:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:37 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x0, 0x2713, 0x0, &(0x7f0000000000)) [ 2100.127258] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2100.173312] kernel msg: ebtables bug: please report to author: bad policy 21:15:37 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") socket(0x40000000015, 0x805, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2100.225378] kernel msg: ebtables bug: please report to author: bad policy [ 2100.249501] kernel msg: ebtables bug: please report to author: bad policy 21:15:37 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x0, 0x2713, 0x0, &(0x7f0000000000)) [ 2100.359963] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2100.364844] kernel msg: ebtables bug: please report to author: bad policy [ 2100.370940] kernel msg: ebtables bug: please report to author: bad policy 21:15:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x0, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c12") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:38 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:38 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x0, 0x2713, 0x0, &(0x7f0000000000)) [ 2100.419946] kernel msg: ebtables bug: please report to author: bad policy 21:15:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2100.497753] kernel msg: ebtables bug: please report to author: bad policy [ 2100.517008] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:38 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f0000000000)) 21:15:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x0, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:38 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:38 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:38 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f0000000000)) [ 2100.693675] kernel msg: ebtables bug: please report to author: bad policy [ 2100.701184] kernel msg: ebtables bug: please report to author: bad policy 21:15:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2100.742044] kernel msg: ebtables bug: please report to author: bad policy [ 2100.774957] kernel msg: ebtables bug: please report to author: bad policy 21:15:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2100.826780] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:38 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f0000000000)) 21:15:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0x0, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:38 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2100.870512] kernel msg: ebtables bug: please report to author: bad policy 21:15:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, 0x0) 21:15:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2100.978891] kernel msg: ebtables bug: please report to author: bad policy [ 2101.008372] kernel msg: ebtables bug: please report to author: bad policy 21:15:38 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2101.042652] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2101.045099] kernel msg: ebtables bug: please report to author: bad policy [ 2101.096713] kernel msg: ebtables bug: please report to author: bad policy 21:15:38 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, 0x0) 21:15:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x0, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2101.171638] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:38 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:38 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, 0x0) [ 2101.302243] kernel msg: ebtables bug: please report to author: bad policy [ 2101.348145] kernel msg: ebtables bug: please report to author: bad policy 21:15:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x0, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:39 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2101.401904] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2101.435521] kernel msg: ebtables bug: please report to author: bad policy 21:15:39 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, 0x0) 21:15:39 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2101.520825] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2101.545813] kernel msg: ebtables bug: please report to author: bad policy 21:15:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x0, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) socket$inet_sctp(0x2, 0x8000000000001, 0x84) ioctl$KVM_RUN(r2, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) [ 2101.663674] kernel msg: ebtables bug: please report to author: bad policy [ 2101.667325] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2101.721571] kernel msg: ebtables bug: please report to author: bad policy 21:15:39 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x0, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2101.853838] kernel msg: ebtables bug: please report to author: bad policy 21:15:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2101.918095] kernel msg: ebtables bug: please report to author: bad policy [ 2101.933583] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2101.957145] kernel msg: ebtables bug: please report to author: bad policy 21:15:39 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) socket$inet_sctp(0x2, 0x8000000000001, 0x84) ioctl$KVM_RUN(r2, 0xae80, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x2000, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x100) 21:15:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2102.040667] kernel msg: ebtables bug: please report to author: bad policy 21:15:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0x0, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2102.152497] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2102.171016] kernel msg: ebtables bug: please report to author: bad policy 21:15:39 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2102.231927] kernel msg: ebtables bug: please report to author: bad policy 21:15:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2102.282209] kernel msg: ebtables bug: please report to author: bad policy 21:15:40 executing program 0 (fault-call:1 fault-nth:0): r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0x0, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:40 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:40 executing program 3 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2102.374346] kernel msg: ebtables bug: please report to author: bad policy [ 2102.397446] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:40 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2102.543764] FAULT_INJECTION: forcing a failure. [ 2102.543764] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.563026] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2102.571130] CPU: 0 PID: 27238 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #28 [ 2102.578783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2102.578790] Call Trace: [ 2102.578813] dump_stack+0x1db/0x2d0 [ 2102.578831] ? dump_stack_print_info.cold+0x20/0x20 [ 2102.578848] ? __lock_acquire+0x572/0x4a30 [ 2102.592513] kernel msg: ebtables bug: please report to author: bad policy [ 2102.594517] ? __fget+0x472/0x710 [ 2102.594545] should_fail.cold+0xa/0x15 [ 2102.618145] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2102.623260] ? ___might_sleep+0x1e7/0x310 [ 2102.627432] ? arch_local_save_flags+0x50/0x50 [ 2102.632120] ? lock_acquire+0x1db/0x570 [ 2102.636122] __should_failslab+0x121/0x190 [ 2102.636143] should_failslab+0x9/0x14 [ 2102.636156] __kmalloc+0x2dc/0x740 [ 2102.636250] ? rds_info_getsockopt+0x6dd/0x990 [ 2102.636268] rds_info_getsockopt+0x6dd/0x990 [ 2102.656914] ? rds_info_iter_unmap+0x100/0x100 [ 2102.661511] ? lock_downgrade+0x910/0x910 [ 2102.665671] ? lock_release+0xc40/0xc40 [ 2102.669750] rds_getsockopt+0x185/0x2f0 [ 2102.673750] __sys_getsockopt+0x196/0x370 [ 2102.677919] ? kernel_setsockopt+0x1e0/0x1e0 [ 2102.681235] kernel msg: ebtables bug: please report to author: bad policy [ 2102.682336] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2102.682354] ? trace_hardirqs_on+0xbd/0x310 [ 2102.682376] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2102.703554] ? trace_hardirqs_off_caller+0x300/0x300 [ 2102.708696] __x64_sys_getsockopt+0xbe/0x150 [ 2102.713122] do_syscall_64+0x1a3/0x800 [ 2102.717025] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2102.722079] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2102.727232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2102.732099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2102.737293] RIP: 0033:0x457ec9 [ 2102.740495] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2102.759423] RSP: 002b:00007f041ef0bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2102.767161] RAX: ffffffffffffffda RBX: 00007f041ef0bc90 RCX: 0000000000457ec9 [ 2102.774435] RDX: 0000000000002713 RSI: 0000000000000114 RDI: 0000000000000004 [ 2102.781709] RBP: 000000000073bf00 R08: 0000000020000000 R09: 0000000000000000 21:15:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x2, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0x0, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:40 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2102.788984] R10: 0000000020af0fe7 R11: 0000000000000246 R12: 00007f041ef0c6d4 [ 2102.796274] R13: 00000000004be9a7 R14: 00000000004cf4b0 R15: 0000000000000005 21:15:40 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x80, 0x2713, 0x0, &(0x7f0000000000)) 21:15:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2102.919450] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:40 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:40 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) r1 = accept4$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x800) ioctl$sock_netdev_private(r1, 0x89f0, &(0x7f00000000c0)="36a5ed0082069a33641ea1ac3618eed1f4b27fe7140f18567b89912547a6da569a4e9980b7b577e984e34b2c063460577f87a50e8578e6573df29cbf2f12b9bf42d5393d809e85dcd2e27b468310a06bb7f5951e8f10de6dabba3c6a50c37f61721558e8b3a4c4f821d5293c63061e7614e3c0ffbea8f8ab2e0ca2b1678aec082cb2c9fbdaad013a93169a955c5406993a24d0c1a44be8058d693bf61b78ae7e1d6fb0d7664f0271734dbbf6") getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2102.992237] kernel msg: ebtables bug: please report to author: bad policy [ 2103.056727] kernel msg: ebtables bug: please report to author: bad policy 21:15:40 executing program 2 (fault-call:10 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2103.103429] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:40 executing program 3 (fault-call:3 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:40 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200100, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000000c0)={0x1, 0x0, [{0x5e, 0x5, 0x0, 0x0, @adapter={0x9, 0x0, 0x7fffffff, 0x4, 0x1}}]}) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x5, 0x34d) 21:15:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:40 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2103.263994] FAULT_INJECTION: forcing a failure. [ 2103.263994] name failslab, interval 1, probability 0, space 0, times 0 [ 2103.307874] CPU: 0 PID: 27283 Comm: syz-executor2 Not tainted 5.0.0-rc2+ #28 [ 2103.315114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2103.324478] Call Trace: [ 2103.327112] dump_stack+0x1db/0x2d0 [ 2103.330792] ? dump_stack_print_info.cold+0x20/0x20 [ 2103.335920] ? kvm_get_pfn+0x280/0x280 [ 2103.339823] ? add_lock_to_list.isra.0+0x450/0x450 [ 2103.344779] should_fail.cold+0xa/0x15 [ 2103.348690] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2103.353811] ? ___might_sleep+0x1e7/0x310 [ 2103.358009] ? arch_local_save_flags+0x50/0x50 [ 2103.362633] ? vmx_set_apic_access_page_addr+0xe7/0x590 [ 2103.368050] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2103.373741] __should_failslab+0x121/0x190 [ 2103.378033] should_failslab+0x9/0x14 [ 2103.381882] kmem_cache_alloc+0x2be/0x710 [ 2103.386073] ? retint_kernel+0x2d/0x2d [ 2103.389990] mmu_topup_memory_caches+0x97/0x490 [ 2103.394674] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2103.400232] ? kvm_apic_has_interrupt+0xe9/0x230 [ 2103.405024] kvm_mmu_load+0x21/0x1200 [ 2103.408841] ? kvm_apic_accept_pic_intr+0xef/0x1a0 [ 2103.413896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2103.419549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2103.425105] vcpu_enter_guest+0x3f0e/0x6520 [ 2103.429477] ? emulator_read_emulated+0x50/0x50 [ 2103.434158] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2103.438757] ? retint_kernel+0x2d/0x2d [ 2103.442659] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2103.447720] ? check_preemption_disabled+0x48/0x290 [ 2103.452752] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2103.457537] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2103.463017] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2103.467799] ? retint_kernel+0x2d/0x2d [ 2103.471715] ? kvm_arch_vcpu_ioctl_run+0x40f/0x16e0 [ 2103.476755] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 2103.481854] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 2103.486930] kvm_vcpu_ioctl+0x558/0x12d0 [ 2103.491018] ? kvm_vcpu_block+0x1010/0x1010 [ 2103.495353] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2103.499947] ? retint_kernel+0x2d/0x2d [ 2103.503844] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2103.508787] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2103.513557] ? lock_downgrade+0x910/0x910 [ 2103.517727] ? kasan_check_read+0x11/0x20 [ 2103.521892] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2103.527192] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2103.532088] ? retint_kernel+0x2d/0x2d [ 2103.535998] ? do_vfs_ioctl+0x1394/0x17d0 [ 2103.540160] ? kvm_vcpu_block+0x1010/0x1010 [ 2103.544490] do_vfs_ioctl+0x107b/0x17d0 [ 2103.548476] ? wait_for_completion+0x810/0x810 [ 2103.553103] ? ioctl_preallocate+0x2f0/0x2f0 [ 2103.557564] ? __fget_light+0x2db/0x420 [ 2103.561607] ? fget_raw+0x20/0x20 [ 2103.565080] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2103.570641] ? fput+0x128/0x1a0 [ 2103.573939] ? do_syscall_64+0x8c/0x800 [ 2103.577930] ? do_syscall_64+0x8c/0x800 [ 2103.582045] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2103.586651] ? security_file_ioctl+0x93/0xc0 [ 2103.591104] ksys_ioctl+0xab/0xd0 [ 2103.594639] __x64_sys_ioctl+0x73/0xb0 [ 2103.598545] do_syscall_64+0x1a3/0x800 [ 2103.602458] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2103.607410] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2103.612449] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2103.617315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2103.622515] RIP: 0033:0x457ec9 [ 2103.625805] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2103.644720] RSP: 002b:00007f1fbb9f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2103.652446] RAX: ffffffffffffffda RBX: 00007f1fbb9f9c90 RCX: 0000000000457ec9 21:15:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2103.659731] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 2103.667016] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2103.674296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1fbb9fa6d4 [ 2103.681587] R13: 00000000004c0e36 R14: 00000000004d2a38 R15: 0000000000000007 21:15:41 executing program 0: r0 = socket(0x40000000015, 0x800, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000140)) write$P9_RWALK(r1, &(0x7f0000000200)={0x64, 0x6f, 0x2, {0x7, [{0x12, 0x0, 0x3}, {0x0, 0x1}, {0x80, 0x0, 0x8}, {0x1, 0x1, 0x1}, {0x11, 0x3, 0x4}, {0x80, 0x0, 0x7}, {0x81, 0x4, 0x1}]}}, 0x64) 21:15:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2103.776003] kernel msg: ebtables bug: please report to author: bad policy [ 2103.793235] kernel msg: ebtables bug: please report to author: bad policy 21:15:41 executing program 0: r0 = socket(0x40000000014, 0x805, 0xfffffffffffffffb) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) r1 = gettid() r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000400)={r3, &(0x7f0000000380)=""/91}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f00000001c0)={{0x7, 0x6, 0x5, 0x0, '\x00', 0x1}, 0x5, 0x4, 0x100000001, r1, 0x7, 0x0, 'syz1\x00', &(0x7f0000000100)=['ftrustedproc%GPLsecurity\x00', 'eth0trusted/selfwlan0trustedcgroup:md5summime_type!\x00', '\x00', 'self&em0:hmd5sumnodevproc{system\x00', '+/#posix_acl_access\x00', '*ppp1#securitykeyring\x00', '(\x00'], 0x9b, [], [0x7, 0x7fffffff, 0xfffffffffffff800, 0x7c0c]}) sched_setscheduler(r1, 0x6, &(0x7f0000000080)=0x800) [ 2103.904528] FAULT_INJECTION: forcing a failure. [ 2103.904528] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2103.949355] CPU: 0 PID: 27313 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #28 [ 2103.954060] kernel msg: ebtables bug: please report to author: bad policy [ 2103.956633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2103.956641] Call Trace: [ 2103.956663] dump_stack+0x1db/0x2d0 [ 2103.956682] ? dump_stack_print_info.cold+0x20/0x20 [ 2103.956699] ? __lock_acquire+0x572/0x4a30 [ 2103.956711] ? mark_held_locks+0x100/0x100 [ 2103.956737] should_fail.cold+0xa/0x15 [ 2103.956756] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2103.956771] ? print_usage_bug+0xd0/0xd0 [ 2103.956792] ? __lock_acquire+0x572/0x4a30 [ 2103.956805] ? print_usage_bug+0xd0/0xd0 [ 2103.956827] should_fail_alloc_page+0x50/0x60 [ 2103.956841] __alloc_pages_nodemask+0x323/0xdc0 [ 2103.956861] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2103.956875] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2103.956920] ? ima_match_policy+0xac3/0x1550 [ 2103.956940] ? print_usage_bug+0xd0/0xd0 [ 2103.956961] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2103.956977] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2103.956998] alloc_pages_vma+0x39a/0x540 [ 2103.957022] do_huge_pmd_anonymous_page+0x53a/0x17f0 [ 2103.957033] ? __lock_acquire+0x572/0x4a30 [ 2103.957056] ? __thp_get_unmapped_area+0x190/0x190 [ 2103.957071] ? mark_held_locks+0x100/0x100 [ 2103.957087] ? mark_held_locks+0x100/0x100 [ 2103.957115] ? pud_val+0x85/0x100 [ 2103.957127] ? pmd_val+0x100/0x100 [ 2103.957142] ? check_noncircular+0x20/0x20 [ 2104.092515] __handle_mm_fault+0x385a/0x55a0 [ 2104.096966] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2104.101831] ? check_preemption_disabled+0x48/0x290 [ 2104.106876] ? handle_mm_fault+0x3cc/0xc80 [ 2104.111147] ? lock_downgrade+0x910/0x910 [ 2104.115295] ? kasan_check_read+0x11/0x20 [ 2104.119441] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2104.124723] ? rcu_read_unlock_special+0x380/0x380 [ 2104.129654] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2104.135312] ? check_preemption_disabled+0x48/0x290 [ 2104.140330] handle_mm_fault+0x4ec/0xc80 [ 2104.144497] ? __handle_mm_fault+0x55a0/0x55a0 [ 2104.149097] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2104.154124] __get_user_pages+0x8f7/0x1e10 [ 2104.158365] ? follow_page_mask+0x1f40/0x1f40 [ 2104.162857] ? lock_release+0xc40/0xc40 [ 2104.166847] ? __kmalloc+0x15c/0x740 [ 2104.170570] ? rds_info_getsockopt+0x6dd/0x990 [ 2104.175146] ? rds_getsockopt+0x185/0x2f0 [ 2104.179324] ? down_read+0x8d/0x120 [ 2104.182984] ? get_user_pages_unlocked+0xfe/0x5d0 [ 2104.187836] ? __down_interruptible+0x740/0x740 [ 2104.192515] ? fs_reclaim_acquire+0x20/0x20 [ 2104.196853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2104.202405] ? should_fail+0x1e6/0xd22 [ 2104.206330] get_user_pages_unlocked+0x2fd/0x5d0 [ 2104.211109] ? get_user_pages_longterm+0x630/0x630 [ 2104.216046] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 2104.221596] ? rcu_pm_notify+0xd0/0xd0 [ 2104.226490] get_user_pages_fast+0x317/0x460 [ 2104.230977] ? __get_user_pages_fast+0x3f0/0x3f0 [ 2104.235741] ? rds_info_getsockopt+0x6dd/0x990 [ 2104.240337] rds_info_getsockopt+0x70c/0x990 [ 2104.244764] ? rds_info_iter_unmap+0x100/0x100 [ 2104.249349] ? lock_downgrade+0x910/0x910 [ 2104.253491] ? lock_release+0xc40/0xc40 [ 2104.257472] rds_getsockopt+0x185/0x2f0 [ 2104.261448] __sys_getsockopt+0x196/0x370 [ 2104.265597] ? kernel_setsockopt+0x1e0/0x1e0 [ 2104.270029] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2104.274614] ? trace_hardirqs_on+0xbd/0x310 [ 2104.278931] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2104.284291] ? trace_hardirqs_off_caller+0x300/0x300 [ 2104.289391] __x64_sys_getsockopt+0xbe/0x150 [ 2104.293804] do_syscall_64+0x1a3/0x800 [ 2104.297691] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2104.302724] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2104.307739] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2104.312670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2104.317853] RIP: 0033:0x457ec9 [ 2104.321041] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2104.339938] RSP: 002b:00007f041ef0bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 2104.347731] RAX: ffffffffffffffda RBX: 00007f041ef0bc90 RCX: 0000000000457ec9 [ 2104.354991] RDX: 0000000000002713 RSI: 0000000000000114 RDI: 0000000000000004 [ 2104.362253] RBP: 000000000073bf00 R08: 0000000020000000 R09: 0000000000000000 [ 2104.369534] R10: 0000000020af0fe7 R11: 0000000000000246 R12: 00007f041ef0c6d4 [ 2104.376801] R13: 00000000004be9a7 R14: 00000000004cf4b0 R15: 0000000000000005 21:15:42 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:42 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:42 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000100)={0x0, 0x1, 0xfff, 0x0, 0x13}) 21:15:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:43 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r0 = socket(0x40000000015, 0x805, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, 'TIPCv2\x00'}, {0x20, 'TIPCv2\x00'}, {0x20, 'TIPCv2\x00'}, {0x20, 'TIPCv2\x00'}], 0xa, "c9d1d995f7f4810192ebe4f2704dd739510c7b4b6428890a0aa740d71fea413ae4fa46dae939bd5894a7c7474ee52620cab830f0ac6bd8f02949bb17fa76cca672b635f14d114bc917d39227ee14df9d614f"}, 0x7d) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2105.434787] IPVS: ftp: loaded support on port[0] = 21 [ 2105.474894] kernel msg: ebtables bug: please report to author: bad policy [ 2105.501347] IPVS: ftp: loaded support on port[0] = 21 21:15:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x2, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2105.541570] kernel msg: ebtables bug: please report to author: bad policy 21:15:43 executing program 0: sysfs$3(0x3) r0 = socket(0x40000000015, 0x805, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80080, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x80) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:43 executing program 0: r0 = socket(0x1f, 0x0, 0xfffffffffffffffc) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x1f0, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2105.793269] kernel msg: ebtables bug: please report to author: bad policy [ 2106.040126] chnl_net:caif_netlink_parms(): no params data found [ 2106.102009] chnl_net:caif_netlink_parms(): no params data found [ 2106.160766] bridge0: port 1(bridge_slave_0) entered blocking state [ 2106.167695] bridge0: port 1(bridge_slave_0) entered disabled state [ 2106.174905] device bridge_slave_0 entered promiscuous mode [ 2106.189314] bridge0: port 2(bridge_slave_1) entered blocking state [ 2106.197398] bridge0: port 2(bridge_slave_1) entered disabled state [ 2106.204496] device bridge_slave_1 entered promiscuous mode [ 2106.211559] bridge0: port 1(bridge_slave_0) entered blocking state [ 2106.218092] bridge0: port 1(bridge_slave_0) entered disabled state [ 2106.225290] device bridge_slave_0 entered promiscuous mode [ 2106.249145] bridge0: port 2(bridge_slave_1) entered blocking state [ 2106.255597] bridge0: port 2(bridge_slave_1) entered disabled state [ 2106.263950] device bridge_slave_1 entered promiscuous mode [ 2106.290278] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2106.310456] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2106.319763] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2106.335270] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2106.361018] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2106.368520] team0: Port device team_slave_0 added [ 2106.373805] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2106.385588] team0: Port device team_slave_0 added [ 2106.391195] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2106.399738] team0: Port device team_slave_1 added [ 2106.412668] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2106.420569] team0: Port device team_slave_1 added [ 2106.426057] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2106.433472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2106.444123] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2106.453530] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2106.558441] device hsr_slave_0 entered promiscuous mode [ 2106.596258] device hsr_slave_1 entered promiscuous mode [ 2106.680043] device hsr_slave_0 entered promiscuous mode [ 2106.716350] device hsr_slave_1 entered promiscuous mode [ 2106.761601] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2106.768908] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2106.780450] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2106.798828] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2106.821113] bridge0: port 2(bridge_slave_1) entered blocking state [ 2106.827553] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2106.834303] bridge0: port 1(bridge_slave_0) entered blocking state [ 2106.840746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2106.861824] bridge0: port 2(bridge_slave_1) entered blocking state [ 2106.868294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2106.874923] bridge0: port 1(bridge_slave_0) entered blocking state [ 2106.881368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2106.958674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2106.969517] device bridge_slave_1 left promiscuous mode [ 2106.975041] bridge0: port 2(bridge_slave_1) entered disabled state [ 2107.016719] device bridge_slave_0 left promiscuous mode [ 2107.022215] bridge0: port 1(bridge_slave_0) entered disabled state [ 2107.087590] device bridge_slave_1 left promiscuous mode [ 2107.093090] bridge0: port 2(bridge_slave_1) entered disabled state [ 2107.146673] device bridge_slave_0 left promiscuous mode [ 2107.152150] bridge0: port 1(bridge_slave_0) entered disabled state [ 2107.339378] device hsr_slave_1 left promiscuous mode [ 2107.379828] device hsr_slave_0 left promiscuous mode [ 2107.421695] team0 (unregistering): Port device team_slave_1 removed [ 2107.433135] team0 (unregistering): Port device team_slave_0 removed [ 2107.444245] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2107.484745] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2107.584289] bond0 (unregistering): Released all slaves [ 2107.718377] device hsr_slave_1 left promiscuous mode [ 2107.760019] device hsr_slave_0 left promiscuous mode [ 2107.819362] team0 (unregistering): Port device team_slave_1 removed [ 2107.834859] team0 (unregistering): Port device team_slave_0 removed [ 2107.846377] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2107.903856] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2108.001476] bond0 (unregistering): Released all slaves [ 2108.063313] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2108.070604] bridge0: port 1(bridge_slave_0) entered disabled state [ 2108.079432] bridge0: port 2(bridge_slave_1) entered disabled state [ 2108.087410] bridge0: port 1(bridge_slave_0) entered disabled state [ 2108.096765] bridge0: port 2(bridge_slave_1) entered disabled state [ 2108.119277] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2108.132782] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2108.139814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2108.147755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2108.160858] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2108.169965] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2108.177338] 8021q: adding VLAN 0 to HW filter on device team0 [ 2108.185303] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2108.192921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2108.200372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2108.210049] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2108.217035] 8021q: adding VLAN 0 to HW filter on device team0 [ 2108.224563] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2108.233469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2108.241789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2108.250826] bridge0: port 1(bridge_slave_0) entered blocking state [ 2108.257262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2108.266186] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2108.276754] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2108.284898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2108.293493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2108.301283] bridge0: port 2(bridge_slave_1) entered blocking state [ 2108.307690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2108.314960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2108.324841] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2108.333945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2108.344281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2108.353057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2108.361108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2108.369003] bridge0: port 1(bridge_slave_0) entered blocking state [ 2108.375370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2108.387506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2108.395461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2108.406355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2108.414559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2108.423266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2108.431239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2108.439315] bridge0: port 2(bridge_slave_1) entered blocking state [ 2108.445662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2108.452651] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2108.463889] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2108.472120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2108.480443] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2108.489748] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2108.498855] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2108.508706] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2108.515815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2108.523704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2108.531540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2108.539226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2108.549638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2108.559441] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2108.570443] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2108.576783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2108.584144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2108.592400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2108.603003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2108.611412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2108.620342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2108.630882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2108.640922] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2108.650999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2108.659012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2108.669537] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2108.679291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2108.687107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2108.695479] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2108.704960] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2108.714874] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2108.725617] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2108.732617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2108.743524] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2108.752371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2108.761856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2108.778538] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2108.790743] 8021q: adding VLAN 0 to HW filter on device batadv0 21:15:46 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:46 executing program 0: r0 = socket(0x40000000015, 0x8000f, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000280)=@md5={0x1, "23685058942ea0cc0c2c108e44e5870f"}, 0x11, 0x0) getsockopt(r0, 0xb, 0x5, 0x0, &(0x7f0000000000)=0x7eee16017c35f577) r1 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x10000000000, 0x18000) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cachefiles\x00', 0x90041, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000300)=0x10000, 0xfffffffffffffeb2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r3, 0x1, 0x6, @broadcast}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$VIDIOC_ENUMAUDIO(r4, 0xc0345641, &(0x7f0000000240)={0x9, "1963b157d0000c71628bf2af0cf49ab2f14db48029264145bd74f2cf12b909b7", 0x1, 0x1}) 21:15:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x5421, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x5, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:46 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2108.831945] kernel msg: ebtables bug: please report to author: bad policy [ 2108.844326] kernel msg: ebtables bug: please report to author: bad policy [ 2108.846882] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x8, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:46 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f00000000c0)=0x5, 0x7) getsockopt(r0, 0x114, 0x4, 0x0, &(0x7f0000000000)=0x20d) 21:15:46 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2108.940105] kernel msg: ebtables bug: please report to author: bad policy [ 2108.948422] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2108.952365] kernel msg: ebtables bug: please report to author: bad policy 21:15:46 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2108.994533] kernel msg: ebtables bug: please report to author: bad policy 21:15:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:46 executing program 0: r0 = socket(0x40000000015, 0x805, 0x7fffffff) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2109.078076] kernel msg: ebtables bug: please report to author: bad policy 21:15:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2710, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2109.124732] kernel msg: ebtables bug: please report to author: bad policy 21:15:46 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x5450, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2109.173082] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2109.173914] kernel msg: ebtables bug: please report to author: bad policy 21:15:46 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) r1 = semget$private(0x0, 0x2, 0x7) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000040)=[0x9, 0x5, 0x80000000, 0x8]) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x8000, 0x0) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f00000000c0)) 21:15:46 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2721, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2109.261423] kernel msg: ebtables bug: please report to author: bad policy [ 2109.292804] kernel msg: ebtables bug: please report to author: bad policy 21:15:47 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:47 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0x1ca, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80080, 0x0) mknodat(r1, &(0x7f00000000c0)='./file0\x00', 0x110, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2109.458104] kernel msg: ebtables bug: please report to author: bad policy [ 2109.461134] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x27f0, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:47 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:47 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:47 executing program 0: sysfs$3(0x3) r0 = socket(0x400000000008, 0x80803, 0xb8) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2109.604771] kernel msg: ebtables bug: please report to author: bad policy [ 2109.638471] kernel msg: ebtables bug: please report to author: bad policy [ 2109.646059] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x5451, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2109.672927] kernel msg: ebtables bug: please report to author: bad policy 21:15:47 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0x4b) 21:15:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:47 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2109.839316] kernel msg: ebtables bug: please report to author: bad policy [ 2109.869304] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:47 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) listen(r0, 0x10000) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0x7ffff000) [ 2109.898069] kernel msg: ebtables bug: please report to author: bad policy [ 2109.918867] kernel msg: ebtables bug: please report to author: bad policy 21:15:47 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:47 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x5452, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2110.053548] kernel msg: ebtables bug: please report to author: bad policy [ 2110.072776] kernel msg: ebtables bug: please report to author: bad policy 21:15:47 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x3, 0x2) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x42001, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000003c0)={r0, r2}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x110) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f00000000c0)={{0x1, @addr=0xfffffffffffffff8}, "3756013c33a777080f29017fe301db91636a6e69294ab1549c8903af6cbbd348", 0x1}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000400)='yam0\x00', 0x10) r4 = socket(0x40000000015, 0x805, 0x0) getsockopt(r4, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:47 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) write$FUSE_INIT(r0, &(0x7f0000000200)={0x50, 0x0, 0x7, {0x7, 0x1c, 0x6, 0x120000, 0x4b, 0x4fb1, 0x401, 0x10}}, 0x50) r1 = socket(0x40000000015, 0x805, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000140)={r1, r1, 0x8, 0xc2, &(0x7f0000000040)="498e19c7bd963b9488efa5323419680fdc21bf9b26cfe4687d485958eb727e22ce51b1b4c180ab4f22f2c0203411833ca42437d1a4faf15398e2f59285afc24bb63478df1bd946f349f8e1bf5ee240f1896e5411c749e9f836b0a1002633ee5533e2913bc702acf72672ee963f79945601880d6475fa98b80b9f7d7d21c58e5e26f21d08f8aa71fd69680dbd9f49505d073116488f0be57d47c482588f608b1e6e6a042e4e7bf99c60054a8af7682bb74d3b9a23bcded373ae322097f0be23ee4300", 0x8, 0x1, 0x8e3, 0x8001, 0x681283f1, 0x0, 0x5, 'syz1\x00'}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000280)={0x9, {{0x2, 0x4e21, @loopback}}}, 0x88) getsockopt(r1, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2110.123127] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2110.202721] kernel msg: ebtables bug: please report to author: bad policy 21:15:47 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2110.267094] kernel msg: ebtables bug: please report to author: bad policy [ 2110.295295] kernel msg: ebtables bug: please report to author: bad policy 21:15:48 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) socket$caif_stream(0x25, 0x1, 0x3) [ 2110.336836] kernel msg: ebtables bug: please report to author: bad policy 21:15:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x5460, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:48 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4402000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="74010000", @ANYRES16=r1, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) r2 = socket(0x40000000015, 0x805, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x151000, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f00000000c0)={0x4, &(0x7f0000000440)=[0x1, 0x291, 0x6, 0xbe34]}) getsockopt(r2, 0x114, 0x2713, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000003c0)={'bcsf0\x00', 0x5200}) [ 2110.429994] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000000)=0xffffffffffffffb8) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f00000001c0)=0xfffffffffffffc8e) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="040000000000000004f1c8700ca3189b19b65d99fe92b0191128073ffaad0f7511a22cb868376b80e6f901230ce89279b79b444a84c3660e0d526c58735892627e4db52aea0bce34efef3163205f5f266acc44aac960367e5d9caf4203052d0ac4938119ef0ad0ad65590c830801c76b625602faa57a839052d8258fdd405d7400fc70ae7e2d1e3595d9a43585b2cdad4345b511e3335ea97cb5987e4e4d551c1f7e393583fbe235edf8a6ac33ba593655684a9a6cd4af768d4467fa2989bd07c6d5a27dc30685efeca56678dc8417f3e8a5ba7769dec39554a1eb6f38d668944b89d86e64", @ANYRES16=0x0, @ANYBLOB="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"], 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x40800) [ 2110.525229] kernel msg: ebtables bug: please report to author: bad policy 21:15:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:48 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'tunl0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}}) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="726177000000000096000000000000000055de000000000000000000000000003100000060fe8e30ffe1bef32568ec37934669b96723eddef28543d929daf4362d5e70e25a8a05d5836f0f3ad19caded304e9ffaeea8dd95d779928e"], &(0x7f0000000100)=0x55) fsetxattr$security_capability(r0, &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v2={0x2000000, [{0x1, 0x200}, {0x0, 0x4}]}, 0x14, 0x1) 21:15:48 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2110.654734] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2110.679658] kernel msg: ebtables bug: please report to author: bad policy 21:15:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000001, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) [ 2110.730214] kernel msg: ebtables bug: please report to author: bad policy [ 2110.747565] kernel msg: ebtables bug: please report to author: bad policy 21:15:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x40049409, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101000, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000006c0)) socket(0x8, 0x805, 0x20000003) getsockopt(r1, 0xfffffffffffffffe, 0x2002712, &(0x7f0000af0fe7)=""/13, &(0x7f0000000100)=0xd) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000300)=0x1e) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000240)={r1, r2, 0x5, 0xdb, &(0x7f0000000140)="837ab98dff8d28747bafd2a1c77fc73558880908cd1435f8a1105663f252eab045af4ddea31d39a54920dc315988df69075f194340c999b98e64849d9c6f79a8e01f93df15002d2f7807fae2678732611ee015a9ce3a6b8bcf691732960246efd7b08a26e473f14e77c05639c79b62d55e1630bf461b6a5258b5625a6ea68b351e950ba742209b79ad76ede77989c303c0dcfaf3aced58debfe23ccc6451ba18d947af8340a2fe1fb10b08527cb01d11323ece2e36193e57e81625dc2e99f1a6690e5a49e5d1fe10568856e2f8afba501037ed10fc1d337a06dd8d", 0x0, 0x9, 0x480, 0x0, 0x9, 0x2, 0x80, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00'}) 21:15:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2110.788699] kernel msg: ebtables bug: please report to author: bad policy [ 2110.814156] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:48 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:48 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f0000000040)) [ 2110.874782] kernel msg: ebtables bug: please report to author: bad policy [ 2110.953792] kernel msg: ebtables bug: please report to author: bad policy [ 2110.976109] kernel msg: ebtables bug: please report to author: bad policy 21:15:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = socket(0x40000000015, 0x805, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="ffff0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0x24) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000200)=""/22, &(0x7f0000000240)=0x16) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2, 0x80}, &(0x7f0000000140)=0x8) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x400, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2111.007863] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2111.038934] kernel msg: ebtables bug: please report to author: bad policy 21:15:48 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:48 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0xfffffffffffffffd, &(0x7f0000000040)) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2111.136274] kernel msg: ebtables bug: please report to author: bad policy 21:15:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2111.183468] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x800, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2111.232359] kernel msg: ebtables bug: please report to author: bad policy 21:15:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x4004ae8b, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:48 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2111.297071] kernel msg: ebtables bug: please report to author: bad policy 21:15:49 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) ioctl(r0, 0x9, &(0x7f0000000040)="1fef499a1a363a23e3b5ac1d45c18d4c12dec3a971188258e99a2a8ce7c7bc0af0aa6c4a685d0826bd91b0375e6cfdd0e6c68a2edf01803bfc09213a547fee45b2f54c8e6bd3f2aab7a4911c765323a89f82148c0823a21c837a845ccf56d89e211c6f1b244cc6bc0fa23692d26312828bb9e92d3c78930eed31077234146bfbff94c3b374f7fc42c5007133bd528ca973a6b41d92b68454f9cac3d4e8fef0e5c992df8ff85c4f0835d2860bdd0c51a4013cbd2074b8b80d4b8683d13533f1c756704b50aa6d02a3eaa389ceefb33ed1d6fd3960a843a5") 21:15:49 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2111.402757] kernel msg: ebtables bug: please report to author: bad policy [ 2111.442072] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a270") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000000040)=""/13, &(0x7f0000000000)=0xd) 21:15:49 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2111.452811] kernel msg: ebtables bug: please report to author: bad policy 21:15:49 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) prctl$PR_SET_FPEMU(0xa, 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={0x0, 0xcd}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)={r1, 0x63, "e1304a4984c0d705396a85fadf4d97110ec28637663df40de75ecdba3b505c9bef21930641f811e2f6a3811371ffbde4070e052e4fba7d8264aa63935175a1eed0e1239059d13d06393da6cae6c835c875613371c4aea1ee073d01068a66069d155642"}, &(0x7f0000000200)=0x6b) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 2111.539277] kernel msg: ebtables bug: please report to author: bad policy 21:15:49 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2111.610556] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:49 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x9, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2111.677692] kernel msg: ebtables bug: please report to author: bad policy 21:15:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xffffffffffff8001, 0x80000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)={0x2, [0x0, 0x0]}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r1, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2713, 0x0, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000040)=""/17, &(0x7f0000000080)=0x11) 21:15:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x4004ae99, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2111.746917] kernel msg: ebtables bug: please report to author: bad policy [ 2111.771046] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2111.787045] kernel msg: ebtables bug: please report to author: bad policy 21:15:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x402, 0x8, 0x4, 0x5, 0x4, 0x2, 0x6, 0x9, 0x2b1, 0x38, 0x276, 0x6436a627, 0x5, 0x20, 0x1, 0xce35, 0x6}, [{0x6, 0x4, 0x9, 0x7, 0x7fff, 0xc372, 0x1ff, 0x3b3f}, {0x7, 0x1, 0x9, 0x8, 0x1, 0x2, 0x1, 0x8}], "", [[], [], [], [], [], [], []]}, 0x778) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2111.821959] kernel msg: ebtables bug: please report to author: bad policy 21:15:49 executing program 0: r0 = socket(0x40000000015, 0x805, 0x1ff) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:49 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:49 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2112.029695] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:49 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x700000000) r1 = socket(0x9, 0x800, 0x0) getsockopt(r1, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x2040000000015, 0xa, 0x0) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x3, @remote}}, 0x1e) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2112.072862] kernel msg: ebtables bug: please report to author: bad policy 21:15:49 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2112.128801] kernel msg: ebtables bug: please report to author: bad policy 21:15:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x4020940d, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2112.181643] kernel msg: ebtables bug: please report to author: bad policy [ 2112.191685] kernel msg: ebtables bug: please report to author: bad policy 21:15:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:49 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r0, r0, 0x1, 0xd, &(0x7f0000000140)="c328639cda1d238b3767c46b0d137ecf75b6fbd5a4347755d207beab34ebecbbd3bf901e71d7c7d9b02b", 0xffffffffffffffff, 0x5, 0x1, 0x2, 0x3, 0x7, 0x6, 'syz1\x00'}) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$clear(0x7, r1) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40, 0x0) r2 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000006, 0x140010, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000340)={0xac, 0x0, &(0x7f0000000240)=[@transaction_sg={0x40486311, {{0x2, 0x0, 0x4, 0x0, 0x8749db860aef944f, 0x0, 0x0, 0x28, 0x30, &(0x7f0000000100)=[@ptr={0x70742a85, 0x1, &(0x7f00000000c0), 0x1, 0x1, 0x3d}], &(0x7f0000000140)=[0x22485e6115ba7424, 0x38, 0x0, 0x38, 0x0, 0x30]}, 0x401}}, @decrefs={0x40046307, 0x1}, @reply={0x40406301, {0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x50, 0x20, &(0x7f0000000180)=[@flat={0x776a2a85, 0xb, r2, 0x4}, @fd={0x66642a85, 0x0, r0}, @fda={0x66646185, 0x5, 0x4, 0x31}], &(0x7f0000000200)=[0x40, 0x18, 0x40, 0x38]}}, @enter_looper, @request_death={0x400c630e, 0x3}], 0x1e, 0x0, &(0x7f0000000300)="9b0e3bea48bc0a4961915e75c583715f83bfafa79d65fe2cd50515d7d163"}) recvmsg(r1, &(0x7f0000000600)={&(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/14, 0xe}, {&(0x7f0000000440)=""/55, 0x37}, {&(0x7f0000000480)=""/244, 0xf4}], 0x3, &(0x7f00000005c0)}, 0x100) r3 = socket(0x40000000015, 0x805, 0x0) getsockopt(r3, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:49 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2112.332755] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2112.388957] QAT: Invalid ioctl [ 2112.397333] kernel msg: ebtables bug: please report to author: bad policy [ 2112.407248] kernel msg: ebtables bug: please report to author: bad policy 21:15:50 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2112.430057] QAT: Invalid ioctl 21:15:50 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/238, &(0x7f0000000140)=0xee) 21:15:50 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x44, &(0x7f00000000c0)=""/72, &(0x7f0000000000)=0x48) r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000040)=0x101ee) socket$inet_udplite(0x2, 0x2, 0x88) [ 2112.450997] kernel msg: ebtables bug: please report to author: bad policy [ 2112.486294] kernel msg: ebtables bug: please report to author: bad policy 21:15:50 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2112.549790] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2112.556840] kernel msg: ebtables bug: please report to author: bad policy [ 2112.573001] kernel msg: ebtables bug: please report to author: bad policy 21:15:50 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x4048ae9b, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:50 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x101440, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000300)=@buf={0x4f, &(0x7f0000000280)="235a7599257e6dd4ef8ebb3a60a6fb75fffa41fdf49304630bc342d67c52120523b01c22911def0db11c2ae4acae9fdc916563c984ee579dad001af73eaed8de5a3d42a3e418de0f5580e16390265d"}) r1 = socket(0x1, 0x803, 0x5530) getsockopt(r1, 0x114, 0x2713, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="bc4d71b0b0ce22260ef7a6c51b3a6525", 0x10) 21:15:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) socket$rxrpc(0x21, 0x2, 0x2) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2112.712979] kernel msg: ebtables bug: please report to author: bad policy [ 2112.723345] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:50 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2112.820928] kernel msg: ebtables bug: please report to author: bad policy 21:15:50 executing program 0: r0 = socket(0x200000008, 0x4, 0x1) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x6, 0x40400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x106, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x1, r2, 0x0, 0x1, @ib={0x1b, 0x6, 0x100, {"efd3fdd4774c2bdaa2e56ec426e11408"}, 0x1, 0x1f, 0x9}}}, 0xa0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000280)=0x1, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000002c0)={0xcb7c, 0x1b9496a7, 0x81, 0x4}, 0x8) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @broadcast}, &(0x7f0000000080)=0x8) 21:15:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a0708953c5e323046aabd81cc8d9a3142e6dc48e8712507c4fc84aa8da0935385b56d48bbeb12bcba2ef8ba2362c00db94bd17f5c3d9526256d63eba6b8aaf9542202ee415ba67fa61ef46410fca8bc222d3f75cef1a57edf4c9d0de") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2112.872301] kernel msg: ebtables bug: please report to author: bad policy [ 2112.875528] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:50 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:50 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2112.971930] kernel msg: ebtables bug: please report to author: bad policy 21:15:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x4090ae82, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:50 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xf0, r1, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2f53}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb2c3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x711}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd60d}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xff8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xaae2}]}]}, 0xf0}}, 0x8800) r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2113.031884] kernel msg: ebtables bug: please report to author: bad policy [ 2113.054520] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2113.072325] kernel msg: ebtables bug: please report to author: bad policy 21:15:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:50 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:50 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2113.139252] kernel msg: ebtables bug: please report to author: bad policy 21:15:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x280, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000004c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000500)={'veth0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000540)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000580)={@multicast1, @multicast2, 0x0}, &(0x7f00000005c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000600)={{{@in=@initdev, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) accept4$packet(r2, &(0x7f0000002c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002c40)=0x14, 0x80000) getsockname$packet(r2, &(0x7f0000002c80)={0x11, 0x0, 0x0}, &(0x7f0000002cc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002d00)={@mcast2, 0x0}, &(0x7f0000002d40)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000002c0)={'vcan0\x00', r5}) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000003400)={@ipv4={[], [], @loopback}, 0x0}, &(0x7f0000003440)=0x14) getpeername$packet(r2, &(0x7f0000003480)={0x11, 0x0, 0x0}, &(0x7f00000034c0)=0x14) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000003500)={@empty, 0x0}, &(0x7f0000003540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003580)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000003680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000036c0)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000037c0)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000003f40)={@empty, 0x0}, &(0x7f0000003f80)=0x14) accept4$packet(r2, &(0x7f0000003fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004000)=0x14, 0x80000) accept$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0}, &(0x7f0000004080)=0x14) accept$packet(r2, &(0x7f00000040c0)={0x11, 0x0, 0x0}, &(0x7f0000004100)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000004140)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000004180)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000041c0)={'team0\x00', 0x0}) accept$packet(r2, &(0x7f0000005cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005d00)=0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000005d40)={@dev, 0x0}, &(0x7f0000005d80)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000006680)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20800}, 0xc, &(0x7f0000006640)={&(0x7f0000005dc0)=ANY=[@ANYBLOB='P\b\x00\x00', @ANYRES16=r3, @ANYBLOB="080026bd7000fedbdf250200000008000100", @ANYRES32=r4, @ANYBLOB="b001020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696ed22c757000000000000000000000001d00e1ffffffffffffff0803000600000004000400000000", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400de0000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r11, @ANYBLOB="a80102003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r12, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004003de200003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="8401020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400e605000008000600", @ANYRES32=r18, @ANYBLOB="3c00010024000100656e61096c6564000000000000000000000000000000000000000000c38b23526e48c01e99519a56785e0f0000000008", @ANYRES32=r19, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004008000000008000600", @ANYRES32=r20, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000200000054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000240004000000011f04000000140804030002000081000509ffffffff200000744f02000008000100", @ANYRES32=r21, @ANYBLOB="900102003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23, @ANYBLOB="400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400e1d5000008000600", @ANYRES32=r24, @ANYBLOB="54000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000024000400ff0708050500000000fcffff050000000700090807000000060007dc3f00000008000100", @ANYRES32=r25, @ANYBLOB="640102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r26, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r27, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000300000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000000008000600", @ANYRES32=r28, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000600000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004002e0b0000"], 0x850}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0x2) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f00000000c0)) [ 2113.233533] kernel msg: ebtables bug: please report to author: bad policy [ 2113.261993] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2113.284674] kernel msg: ebtables bug: please report to author: bad policy 21:15:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000240)=0xd) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000000c0)={@local, r2}, 0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xffffffffffffff2a) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@loopback, @empty, @local, 0x9, 0xf1, 0x5, 0x500, 0x7fff, 0x800200, r3}) 21:15:51 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000040)="982a15db48a555d9a432edd0facd18ff5087b0fdb9d96efe350b3b2afe8d459b656898cdf2351053063d2637b1e0bcac64914165aa4b7738e639d5af9e9a1843517687cd8edd09e1956180cbe28e4d6eaf4abcc3c03ad31226f89ee318997238ca6afac4bc69b6482dd2a3663c34f536053202971d8dd49d5c5caeff89b1b746d689f05e5508f427478c8c4c4e1faa3d907dc2cbb8", 0x95) [ 2113.353352] kernel msg: ebtables bug: please report to author: bad policy [ 2113.378116] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:51 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x4138ae84, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2113.466858] kernel msg: ebtables bug: please report to author: bad policy 21:15:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:51 executing program 0: socketpair(0x1a, 0x805, 0x866, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sync_file_range(r0, 0x0, 0x4, 0x7) getsockopt(0xffffffffffffffff, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2113.564357] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2113.596166] kernel msg: ebtables bug: please report to author: bad policy 21:15:51 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2113.617350] kernel msg: ebtables bug: please report to author: bad policy [ 2113.654347] kernel msg: ebtables bug: please report to author: bad policy [ 2113.682938] kernel msg: ebtables bug: please report to author: bad policy 21:15:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:51 executing program 0: r0 = dup(0xffffffffffffff9c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000100)='ppp1md5sum-\x00', 0xffffffffffffffff}, 0x30) write$P9_RGETLOCK(r0, &(0x7f0000000180)={0x25, 0x37, 0x2, {0x3, 0xfff, 0x1f, r1, 0x7, 'selinux'}}, 0x25) r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2713, 0x0, &(0x7f0000000000)) getsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000040)={@initdev, @remote}, &(0x7f0000000080)=0x8) modify_ldt$write(0x1, &(0x7f00000000c0)={0x7fffffff, 0x0, 0x400, 0xff, 0xfffffffffffffff7, 0x9, 0x4, 0x4, 0x1}, 0x10) 21:15:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") getsockopt(r0, 0x8001, 0x0, &(0x7f0000000040)=""/63, &(0x7f00000000c0)=0x3f) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x112, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000100)=0xfffffffffffffcda) [ 2113.806689] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2113.826640] kernel msg: ebtables bug: please report to author: bad policy 21:15:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2113.880360] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2113.911700] kernel msg: ebtables bug: please report to author: bad policy 21:15:51 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) fallocate(r1, 0x0, 0x8000, 0x20) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f00000000c0)=0x1fb) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000400)={0x7, 0x2, 0x7, 0x0, 0x0, [{r0, 0x0, 0x7f}, {r0}, {r2, 0x0, 0x8001}, {r0, 0x0, 0x7}, {r0, 0x0, 0x1}, {r0, 0x0, 0x9}, {r0, 0x0, 0xfffffffffffffe01}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000080)=0xba0d) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x402000, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x217f, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x404002, 0x0) r4 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0xfffffffffffffffd, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e20, 0x4dec6e78, @local, 0x6}}, 0x10000, 0x7}, &(0x7f00000002c0)=0x90) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000300)={r5, 0x0, 0x20, 0xfff, 0x5}, &(0x7f0000000340)=0x18) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000100)={'syzkaller0\x00', {0x2, 0x4e22, @multicast1}}) r6 = getpid() perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0xb7, 0x5, 0xc60, 0x0, 0x0, 0x0, 0x3080, 0x8, 0x29, 0x5, 0x0, 0x0, 0x8125, 0x3, 0x4, 0xffffffffffffffec, 0x8, 0x9, 0x8, 0x9, 0x3be, 0xfffffffffffffff7, 0x4, 0x100000000, 0x6, 0x2, 0xf6bc, 0x10e, 0x9, 0x8, 0x9, 0x4, 0x5, 0x69c4, 0x1f, 0x7, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x4001, 0x2, 0x4, 0x0, 0x400, 0x2}, r6, 0x9, r4, 0x1) [ 2113.970328] kernel msg: ebtables bug: please report to author: bad policy [ 2113.984547] kernel msg: ebtables bug: please report to author: bad policy 21:15:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x41a0ae8d, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x59, 0x4, 0xfffffffffffffffe, "bed43b8028af1e8b351949ef620b4c76", "ee9ca2dbaf1711789c3dc6c7368e0ec9dc18472502c9c756dbd19a0d42b575b09154a841541278170b5e9b54d3d88ddf5286f04e7e27e36b1d5a86059727a34091b534e5"}, 0x59, 0x3) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:51 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2114.145441] kernel msg: ebtables bug: please report to author: bad policy [ 2114.186030] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2114.197711] kernel msg: ebtables bug: please report to author: bad policy 21:15:51 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:51 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000240)={0x7af0, 0x7f}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xffad) r3 = fcntl$dupfd(r2, 0x800000406, r2) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x2, 0x30}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x3) ioctl$int_out(r2, 0x5460, &(0x7f0000000200)) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') recvfrom$packet(r4, 0x0, 0x0, 0x2001, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r4, 0x401c5820, &(0x7f0000000040)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000280)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r4, 0x4008642b, &(0x7f00000002c0)={r5}) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r6 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x101202) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r7, 0x202, 0x70bd26, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8814}, 0x10) r8 = socket(0x40000000015, 0x805, 0x0) getsockopt(r8, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2114.226445] kernel msg: ebtables bug: please report to author: bad policy [ 2114.228651] kernel msg: ebtables bug: please report to author: bad policy 21:15:51 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x3, 0x4) 21:15:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:52 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) vmsplice(r0, &(0x7f00000033c0)=[{&(0x7f0000000040)="221bcd03e6e78a4b68e40921ba307926c15ae392a09454eea4bd", 0x1a}, {&(0x7f0000000080)="0964bb69c61b3f63b65c8cb30c748e4b09ef7ccbc2f8ffc14b1dbd5b9843639b1db04f374f4c8336c2b7bbba577d7dc186bb353f7fff387f31d10eb542261a1baeda9abeb7d5b16789c354acac5e5e4229a052227e40d314d721ce24deea75b0fd80b8b4dea18e7140e31334c37aff285a5170a77d932cad046a2134cca805d263", 0x81}, {&(0x7f0000000140)="5f027a3c7fcdc3a273b9a4cfb98268b691d17abdf0bc4fc4ecd45535f8e3459e261ccfa0bee1482ebe5262edd0dfb56bcfb6ad6f602804bb067b266db3bb85547e168709994671a33c71d07d69240f7d9f7d113f66f9588aa5d00709a8c4e915589d23fbfd8d617f2e87a6fd97f5bd3f2c40b8d241acfd86f86d8576050403da1933c37b93c33a1d9a50a01973cad9dc4aeaf14aba71f668d264d729b8edf07e6e076353accdfcd6c7e9874dc642e15c6968b335ac03ab1578fdebc03b2d62709a0c2154a3713e8f591de743", 0xcc}, {&(0x7f0000000240)="90925fe8b76a94ff332d698d2d51b29fabafe2577f671126905e89b60818fa55809e38958b9ea78fe72b73105c5112e6b4ff0d7ac74048d51f43f36a04d3ab545a017737478733ae5186ae4e6e11db29dd2b72", 0x53}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="5014a3ae00e885e70397cf7e0c7d4c301dbe8c4481e0459f6946c82e68fd01cb2b8dbb1bd10add488ec80fe50c7645416cacc3a910fff8bb943eeaf14786dbe837fea704ff5dac3a034c7712c4f8d7a5b9070f5e12db3b4536990bc21152f181b85cff650616d26317421e5c0700e2f3b07f38bac2c39007064fb4d79df388c1504048e71dbbf79bd46732b50b88fcb82e60001865b037d2e83f4249f4dec991f68a9cc1c14e72", 0xa7}, {&(0x7f0000001380)="d845f525132e5f88c03de8f5ccec7e8aab1d7b10b3242b2606824d33bb5d2e9fcaa89ef1161b5f03475befee99b1480ccbc173836ed37c12763d9f11ae856b4ef36f427c1d70797302758e10e0a0f2faeaed6a75c5bc4575e2af39024de95cdadb7c2a861c686d4ad58138222a9d01a78f874317081437a853d8dcc61a38ecdf3f001028f8d8a16d1bfdd06502272fe204fa6234e92cfa20862c0cc400fc1c6e8f121fc3f88220dc8d618f35e8346c55c6e0d8544a386d51cfcc838f475af2ac3f4e46b1eb3a80acc47617bd24abad2e960d500c83d70903b584b7ff5a7adb609383d9e4296ba8c2907f6ad89d5e3d77ca5b127a20570333d26c9a153352b839ebea5941e589049746c0ee2f35f36c86240edc20fc058f70a854488cfa3149b6f75a749af9f1844a4ba7e2e881f4c5f00467e7389a017efdf2255a120e3c6e086705c6e5220ddfcb991945355eb3ea5017a4ec7cf8aa731892212cec111ca5a3545ed30cecfe2860988e5045f61914b7a4425b85c5a59c4b897ba66e3d4d36c43e618eedf8adab69bfaadc702ecfd09cef8b7daa12e7f1275662bd14ee78bc83c3b3aff1c64e322fab44d03afd5e7ccfb4672adb6b4996c38b8d4a141ceccc3cd4d35e258568f7f99551acc92fb1a0badaa84b487d17c83cc79681f505b273bd13a384954eef83ccacc683b0baefb9c652da09b4cc606a50c790dd1612a1aab58a8e53ea20d95f1391e447d55a69ebc3fbfc3d4bc39ee504fc4dd6c0924c358ae22c0fbe14ad85c82a6a18d9930080fd8d944dfc5c4932cd316863da83565bf7a510efe4f1c9627f1657d592e4f67bb0515be38f7619987c8c5b67b81c4a8ac2950dc9ffab583233567b17f9d890a750c0d06f863117252fe3e6c10ba324b9df60433372a024a8e4a67869401f855a0186b1e5fdc075c021a75ebb8af5991dc40c32079b1b8b5bf49de4739db4e072a6702d2975ad0cc414dee4461e235a38584cdfed4744d8936b45c3af75b21e935cc418ea6639bc114ad27217c6011c90dfbbebd044201f84e33a98fb841c359577b875d76ec1490f09f9b88a84acd75d49d8719e0237ec3df7b256c5c54a7ff6719662e39e238d2b2fdf15748e2f4d152b1141ae2886444aaa7b140afa6c407acc98323892951db03b4ce26973536e60138167787668040cc24c9c400038c1ce2552b88a0f3bf5fc35ebb06c09e59c2f669aab9dc9197bb0df3c7b8a9cab88d1afd1712dc5053ac8da889e07112a22479eaa346a6878b56270d6c5ce43ff6815bd46477cce741e229a0a018a777d8d8dc1064c97080aa040593aed941a3edfea3568f9af00458ea4ed16cad184ba5983c70544391574d56c5ca22e2a3d383811dd9aa864b2ece0241ce6ec32ecc3e8e2d1bd5205e314e426d0f5aee24596d2b8806b3895e32c1246db45f7ace9fcd8b8582b68669ebdf478ba4ec9f388e229a611b0034c0a4bcdb0c884fd6be2b217bbcb44f48869071a86c1808cdea33fd008f0d35d8a2c404e801240fc090faddffe8d6f1dc8878119e95d01cf9224620d34b3ee8a1b45d6d255d35329b252a1e37658b4a6a3aae99b088e193286c773d1602b63d7f66167fe80ad2c133c1ce8e113b3dbe03041738b03f345a1789a12ab20d433f831c6b1aa8394d8399f52995a5fbbcd352c6d97d69d39f2df946f6ef83ede1deadc0e21a31dcdb4a2a6b165c8a27f4232f85a5878c2fa682dc3a91562aa449774cb6a2d99044f42643acd61f1177221ce1a04d794c4ca944f2d52721dea6983a34fc659d506ce2fb138d7dfb497c5b373d3b16f8706e3bfb89560c96f7f298654dd13aa8108569f94e716e31b81f3f19d4a91e2de38f68c34731d00467380e32f5bc126186558339853e0c0d0b0c3dba4a1ab4bc431baaa3b8125454257b603478b8ad09123e3158c533ffbbf560d248d8c533214ca082a19effcd298550dbb9845c63814cae8a38ec1b61589fc726c12007da5b2a8fbc1370ea85d62aeace61472c55e23c64fd5ae14cc0973bfa13cac6f99cbbd6dcf30193ad8136880b27458456862940b89e95fe97a0c9d5fd889bab4f589d18259493e3e5139367873f170f7fe9521534a99703fedcb5c00557902dd44208f0adb1511a83a3577af5dba9d9c8e23fa2fcecc1fc7aae0ffdff1b51aab5a669a2e40bbc4cc76b7c9e900be6273193f14741dad903d50ba4d36846ebf6a52e916ddab85c9d2204ff5f91b9b5550367106fb1fe3be213606e31831d3e8126fa64de85a0715dee9b379501cfc7187cdbd919f77b256257efefd9b831e6ae5487e494c71ac09153668a2d107107197d720e3dc4f0695fba2148d63990143014ce0bfd54b74823101861d79d0cff73f40cc26c4e9f8ca47bc885bf01dc9ae9cf4df4881c81f67d276d93e26ad2b57f2466c2191c1f9e26cdcbb8ac0345917032e036b2225bb70275c4b6dc8c3b0801c1cf40a7faf6d855b26334dea535421b16b89981498ec110a5198eb31344daac88feea324e214b563429595327d93e60a3465c13322ae618e35a31edefddb9229ccfe8367e3e26275313f59492c32b7bdcc91010fdd4a703a52b26592cef9392a97ebed662010c097341166671ae9b65928cb36d1906f10119354f04d9bd422ae6b44ac1b180b3fedbd9d4b3e038fcf22f755c4755f2f48b7efed7e2721d7fc7e8fca87a0eb069420f851e995c2a45a0279b659da698479b2fce8870e47c95c052764451708e4c763f1d137e1547471a28a05fde16e2479f08cfedf12f46555386c85022b965573a7cd36304c4b3ab8ab255a3729bbdae9df3e7410977ccc9edd3b43ce53c6b37d263ce547df35d6b0fec1ce9d0540e67b2db889e1f9d068c6e7108e50e8ea4600dd14c4578d6de0bc44934d5c7354fc4f8d77aa1548a6d5d84e6dc8704a1d8298db9bd303f767b78f88b39e80ddb02221b3af68b8cd3b9c2ab552eee44ca84d895e06aeb3ba0bd0d67d4a26f5c97b31b8facdabc0c321b786457c23fb059eaf36bbf19334e103b6807d150573edd7dcd7b6a487864bfc6503e9610bc9e123f06d99713d240295e1414e67a5a73225b5d8b46fed4a053117f5917480b278bd28a6b0b8e000b8e12fdbccab744da01f1ec2b0166a2153ddc6fc3e601ca57593c54af7ee8a9a62315e4a9eb6b6d173d89f6ba90f7007375cbcd190cb0837873050d68bf3cbd8aa99c0ceebbefa1819c748e57eac5a5e17ae2d15f0cae89386fd0a2d37b5147affc37e04bac6590f1908521977b752ea05b9c5d303b1b5de1d6d37682b48026b4aa1bdd90751d8ea95058da9f426089cc7a7e8d4ab7cbd1d2f4a367d48e7fc530b215d4e953feb037c38ba58dbf7f2dfe808b698666cee4bd8dd3095fa8f62de3d5707c2baaa3e561eb4ff3d6c5f0f7131bd95e04c7c996d56d0395209f6fed0b37db323d07b631aa72c932abf4cd7cff2fccf0bd93a550bc743e54d0cc6d55564efe8711e5daa5242e7ce393905a92e9c8d04de4711579066ac5e0b804d61a925e2ade8f393249104a5dc7c39e46db1bb3a2ddcd9683d56bd796dbf64fbf905cadcb7bf4b4724e3a00ba903d3747bda2073f5c5f650041221fe8fabd74fe33bb38c20cf9ff6c8c902ab76fbb93695266f6418b77140c984a66e7bf9e7ade79e353f7170f85de9de99f75617a6a0599ae716409b144a1f2cb14983b3e6da6ee7d29d57e6967a19c25e16c56336d2c8f62374e8455f248fd4edc338986d9f4e7f4cc9c5fa2cb3c8619fd42cbd0ca5a4aa841330562f831b8874a04cdad9406206d8e94c1d93ebfc761e79f1ed0172aecc0c50a76975be60afc3f4b6f1316dff91dac3d34d56ff2f1e87f9fbe01ab88699761c762dee4158b0f0f11e8a2acc398a31530d82f44d844467438415af07d4aca58be6964aff5d06b4f51275ee76096f479d7c7c437f10707b7352212f5245fe37e1d24934ccf99da0c8b15abcb47533bb504fc1706b9ea4313fc03fc2427137187a895e30bc9b3d5dc7f56eea44d0f858cdaeb76d27123c5d46d9250857b41ffbf211013b0094700fe9cee20a72780433a7e52b5a0f6339f3fa2e016040398596ffb248b17e0da0c06843fd194b4dc8b9a278a30bb833a8dc40dcaf4fbf8a5438129cc8ace191e6ced73d58060e10ee4c42ec37a7086eb18e024a4101e1dc29adc1bdf89a50092cc154f639d4fdc5baed699f3ca861c1dde77e4d91e8234de899905b39b9444b08fcb78ef66f7d96c4f07ede30d82c987664ef2f8be93a3d6b47c73359fe8dbbdb14a1958e0caed8882a59aeb612ae1905334820d1c2c546fb6b17a855b7998bd7b361c15ee804a7aaee1f53f0a6de1e3c856f02eb5f65e211c0bf2e97d2c8fb0451904b408d23eb9719c5627cf2554ea0e239442f5357f68c3286a9881faa7dd0b6ca063e20025d7efbb3b25d4960e4357cb8eda157854c9978296ddb7b5e21843783a50551447bec12b6cf523e7947104b3664fd33ae72bc2cd259e9e3d53dda175739c35d375ec094a982942595c02add25eee3f860a9f8058cde0182c7341ffa11b6301b6fc8aec705a75372b412674386b82d0c9df3e92fd6aefe603835afa02016ba3137a29ab15e8b88ec82a6eadd29759a9b14281bd821d40db4f3b40c17b0ca08cb4c41165494e5c645fb04d954068e9600bb7ae4d8d2c22474725dddfae93a513fc25720be3e64fe55e6b712d1af42db176f9d1ec6644d4231ff8f0e2ea4fa2db899f01365cd4123e5570d6348d5a5fb4762d09122005bad7c505b0295f4af33a55cc63e29af02ed072f1bf94408ec359065009460cdfce62a42fe84fe2d13a955ccb907e9c7eade461a0353c4f7c26847c27b93669b15ff0edab7a5d840a54e4204a6ca89db89c711f5129a21f17d421b12565ab3a6abbe95ba06cf14ab08f9567165dca0eab73810e50028192812167054f55fae7a4e58d18054d2d08784d1795965ad8ca779bab694e111ef7dd0667abb8bdbac4d26386a7e6875c21a817ba9ac03745dc5587c1622a4430f61f1cbe9a876efd8128c7f174e27c52e4b406394c575684d770e6b85364f455b477a23758caaf0b11a781e43a0efb4c95fa6b159ad338e9ca495256ec976f3fe5e2fe467f60438db98273fb1a0332204dd63b2a920eafbead1b66d5c95558f4bb6c671f8eb583255d204ba879307ce5b0567d43a370feeb4b4bda3c5487f83f40019730f38de79c7185fbda6411e54e30f38508c335a9559c91808545c7a99df1c6ff8a53891d9503364a9728ec5c864272f9d447891520e6503f41e79ef8288024d5f7fa30add050dc63396326a38abbf2e635bec4107157dcc8dd21990a0093484b77feb159180e5915c8ff46ff86928412d9ed97c20852ee14cce2ba9469ab0fe79dc53a408003cc6da434b429e54c5910c3bb2573ef47f65ff342ab56b4ce6794c0088afa43efb766fa4bbe5f0667202ab5a18275b4f3ca365a1e98bccdd3efa41c581c80caf71b2491823d68da3c966fb30a90c59ccc05f6c3ab57a87289374646d2304c3cdadf52ae0ba734f7885080533500c1771bad15aa03ea5d87e9de17e43d755d65301f6efa25457ad27ee2dd10cff4c4347093b4415b3a56629890b80b35dc47c95b5779458b05f108e8e4f15546c76bb8853216cd98d8709d1505dbf03450cf1200a4c2d371cfeedb09caba32b38abf3a5f0eb0c4d99852e306e277526d680a8a22a7ddb6789bf69e0ae82c7bc26b69f6d09ada252a18e90eae66b5d40f4342fc631ec7706d4fbbef2a2a955eb412f44f3b8", 0x1000}, {&(0x7f0000002380)="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", 0x1000}, {&(0x7f0000003380)="9896b01443b2d56b4a8180d77bd5c7c552afffcbc09cd78b1d5e", 0x1a}], 0x9, 0x4) [ 2114.399420] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2114.414513] kernel msg: ebtables bug: please report to author: bad policy 21:15:52 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2114.448599] kernel msg: ebtables bug: please report to author: bad policy [ 2114.473150] kernel msg: ebtables bug: please report to author: bad policy 21:15:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x8004ae98, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0x35d) 21:15:52 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2710, 0x0, &(0x7f0000000000)) [ 2114.522077] kernel msg: ebtables bug: please report to author: bad policy 21:15:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2114.581023] kernel msg: ebtables bug: please report to author: bad policy [ 2114.620230] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:52 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x801, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x7, 0x4000) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r0, r2}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x102) r3 = socket(0x40000000015, 0x805, 0x0) getsockopt(r3, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:52 executing program 0: r0 = socket(0x40000000015, 0x805, 0xfffffffffffffffe) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2114.696875] kernel msg: ebtables bug: please report to author: bad policy [ 2114.723488] kernel msg: ebtables bug: please report to author: bad policy 21:15:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2114.782972] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:52 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x8090ae81, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2114.832152] kernel msg: ebtables bug: please report to author: bad policy [ 2114.872193] kernel msg: ebtables bug: please report to author: bad policy 21:15:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x10001, 0x101000) ioctl$RTC_AIE_ON(r2, 0x7001) 21:15:52 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x7ff, 0x0, &(0x7f0000000000)) 21:15:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2114.935424] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:52 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2115.066744] kernel msg: ebtables bug: please report to author: bad policy 21:15:52 executing program 3: r0 = socket(0x11, 0x9, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x401, 0x22c0) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f00000005c0)={0x1, 0x3, @raw_data=[0xa2b, 0x6, 0xe, 0x0, 0x8, 0x9, 0x7, 0xffffffffffffffff, 0x8, 0x2, 0x4, 0xfffffffffffffffe, 0x2, 0x7, 0x1, 0x629]}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000540)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000440)="f420756a62dc328bdfc91ddc39517b23e93e55370b5bc87180b8778d0b935bbf103fdd675c3822305513f3f7e2612b3b7e51db2c6af293e1ef9356965278cd2b15a4d877f8cf6b5c0e373ba7a5973d814417c20f44aa19e7c2363cdabaa4535156583c310a3878745039458b6430db48a2c38b9f81a76eb49fb9b8f9d6d834a701e3fe7d7c66cf12ada2b6387b4d7cd2f62ebf7cf03529abd982942c014b95556ab7bfa52b8accf6a622ab356c845e5b1064360ec1e3562003e789ad5a8262c3c29921957720d4a9e333d6aa29e3e3a76b8b95df296a76fe4364f2c526964be9f800907dd3866b533e3efdce78b8609ec3c0064fabd4", 0xf6, r1}, 0x68) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x313a, @ipv4={[], [], @empty}, 0xb68}}, 0x9, 0x2, 0x8, 0x80000001, 0x1}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0xffffffffffffffc3, 0x4, 0x1b3ce033, 0x0, r3}, 0x10) socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000640)=0xd) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f0000000400)={0x8, 0x979, &(0x7f0000000280)="2caf53bec7ecc682054f30e72282877210cec0dc90885684fa5998407108fba8f611d590a2a49787187914f52431351860d7e2e9cb04335ae229441476d71392e7a3cf40c196d4e67ee4c23b95887671d2fb2e630a237d27277d", &(0x7f0000000300)="61c064da4c56ab2c164c67a02bbd9392a3ab4cd2f22c7ce924200d812730ed464527a463b7cc42fff071d82274e0616112cf84d7395f26781af64c48b27a8cc0fad40ef0d789c7e16e16dc4a9a0613ce7b46de48ee73b343e87bd2f87a511062e57657ce26abce05b0bbe599a897b35c86803994026512e2abe410135b24e420d294831ee339ce72282386429ad0e688f9647c75fda1a427d2598134fcc595e53ed45c7fce7388b37516e10b6e176c3ab10a4b88adbcebd5417e47b8c7ffabf0dab1c7f95be74dc9fc9d31ef9628657b6824f4f8fa922ba6634e843e66579aed922576a388bdb352ab359a703a16277a3a4b7181ea1c461028", 0x5a, 0xf9}) 21:15:52 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000080)=""/119) [ 2115.127181] kernel msg: ebtables bug: please report to author: bad policy [ 2115.158567] kernel msg: ebtables bug: please report to author: bad policy 21:15:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2115.220085] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:52 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:53 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x7, 0x2711, 0x0, &(0x7f0000000000)=0xfffffffffffffd23) [ 2115.404540] kernel msg: ebtables bug: please report to author: bad policy [ 2115.415749] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:15:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x8138ae83, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x60400, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f00000000c0)={0x2, [0x7, 0xfffffffffffffccd]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:53 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2115.503802] kernel msg: ebtables bug: please report to author: bad policy 21:15:53 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) sendmsg$alg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)="1a6b5db896189c5513537bf9b31a9bf7a2fb5bfc7cb93f1aa84f5bc710bfb4609c2902a13184608410004302b72fe868a20f7d535a4460a0cc", 0x39}, {&(0x7f0000000080)}, {&(0x7f00000000c0)="935db8842b2b1921d507abe28a1ad0c4687b190a04596060ec2dd4eaaf9458594a4644f011a99106901936bfa57f2fd46e7ab484c9ee2edb49673ee21d3718a97b1084b0d44c49a4e8277458445a3eaa3f52b73b6510ccc4899e931246003c5bf23d11462795a6c00cb963c8ce6682373fbcfde952b37a225979310139abe754d91778e0928b2d9fed47df8fa43c5c627d7738f364de2d3f95b4ae32f29ee1f69ad357afba7c11e6c902172113276037721662d1930c13593c2ef5994bb6e11022ad4d216781be874b7f20d7f9f234", 0xcf}, {&(0x7f00000001c0)="ea7c4abcb9c54702cb2fc67f7f56f05fc0ffba71e4ec9235664a5dab8c6c99725eadbc22229eb91734cb6eb818751345a886f8fbb3363d950f1c41566793e9adf54f35406ecbf640522c626295a58c2dcdc809cf19fd38784a32cfd94b24165387e303b3d0b848ff378b7255601b10e542dffc9b0200c2a2681d2fcf0b0a3c51214c6a137695e605703ebec2e9adbba877131e0997eee9540ace2899bb841a0bc002a4c7f21be7b67b93b723a2", 0xad}], 0x4, 0x0, 0x0, 0x4005}, 0x20040000) getsockopt(r0, 0x800000114, 0x2713, 0x0, &(0x7f0000000040)) 21:15:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) uselib(&(0x7f0000000040)='./file0\x00') getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:53 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:53 executing program 0: socket(0x40000000015, 0x805, 0x0) 21:15:54 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0x81a0ae8c, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:54 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:54 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x10, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) 21:15:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:54 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x0, 0x8d, 0x0, &(0x7f0000000040)=0xfffffff3) 21:15:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x64, &(0x7f0000000140)="4f38938d8f57de07000000b9c899cefe74a46c1d25") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000000c0)={0x2, [0x0, 0x0]}) r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:54 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x80000000, 0x270f, 0x0, &(0x7f0000000000)=0xfe02) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x2000000000000000, 0x4) socket(0x9, 0x1, 0x400) 21:15:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:54 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000280)=0xa7c7306cbb498561) capset(&(0x7f00000000c0)={0x200f1526, r0}, &(0x7f0000000100)={0x2edc0ff4, 0x1, 0x9, 0x3, 0x8, 0x5}) r3 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x7, 0x10000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'tunl0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000240)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x61, r4}) getsockopt(0xffffffffffffffff, 0x1, 0x2713, 0x0, &(0x7f0000000140)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x105000, 0x0) 21:15:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xc0045878, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:54 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt(0xffffffffffffffff, 0x114, 0x71d, &(0x7f0000af0fe7)=""/13, &(0x7f0000000100)=0x40bf909f959aca8a) [ 2117.318645] IPVS: ftp: loaded support on port[0] = 21 21:15:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2117.403802] IPVS: ftp: loaded support on port[0] = 21 [ 2117.426525] IPVS: ftp: loaded support on port[0] = 21 [ 2117.766665] chnl_net:caif_netlink_parms(): no params data found [ 2117.780264] chnl_net:caif_netlink_parms(): no params data found [ 2117.815421] chnl_net:caif_netlink_parms(): no params data found [ 2117.881300] bridge0: port 1(bridge_slave_0) entered blocking state [ 2117.889145] bridge0: port 1(bridge_slave_0) entered disabled state [ 2117.897137] device bridge_slave_0 entered promiscuous mode [ 2117.908500] bridge0: port 2(bridge_slave_1) entered blocking state [ 2117.914868] bridge0: port 2(bridge_slave_1) entered disabled state [ 2117.923335] device bridge_slave_1 entered promiscuous mode [ 2117.929971] bridge0: port 1(bridge_slave_0) entered blocking state [ 2117.936658] bridge0: port 1(bridge_slave_0) entered disabled state [ 2117.944080] device bridge_slave_0 entered promiscuous mode [ 2117.965526] bridge0: port 1(bridge_slave_0) entered blocking state [ 2117.972089] bridge0: port 1(bridge_slave_0) entered disabled state [ 2117.979355] device bridge_slave_0 entered promiscuous mode [ 2117.994658] bridge0: port 2(bridge_slave_1) entered blocking state [ 2118.002238] bridge0: port 2(bridge_slave_1) entered disabled state [ 2118.009947] device bridge_slave_1 entered promiscuous mode [ 2118.017063] device bridge_slave_1 left promiscuous mode [ 2118.022565] bridge0: port 2(bridge_slave_1) entered disabled state [ 2118.096980] device bridge_slave_0 left promiscuous mode [ 2118.102563] bridge0: port 1(bridge_slave_0) entered disabled state [ 2118.157776] device bridge_slave_1 left promiscuous mode [ 2118.163327] bridge0: port 2(bridge_slave_1) entered disabled state [ 2118.217036] device bridge_slave_0 left promiscuous mode [ 2118.222592] bridge0: port 1(bridge_slave_0) entered disabled state [ 2118.419982] device hsr_slave_1 left promiscuous mode [ 2118.474298] device hsr_slave_0 left promiscuous mode [ 2118.529740] team0 (unregistering): Port device team_slave_1 removed [ 2118.543772] team0 (unregistering): Port device team_slave_0 removed [ 2118.555113] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2118.613564] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2118.707054] bond0 (unregistering): Released all slaves [ 2118.849875] device hsr_slave_1 left promiscuous mode [ 2118.894139] device hsr_slave_0 left promiscuous mode [ 2118.941916] team0 (unregistering): Port device team_slave_1 removed [ 2118.955326] team0 (unregistering): Port device team_slave_0 removed [ 2118.968349] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2119.040481] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2119.137635] bond0 (unregistering): Released all slaves [ 2119.280637] bridge0: port 2(bridge_slave_1) entered blocking state [ 2119.287191] bridge0: port 2(bridge_slave_1) entered disabled state [ 2119.294188] device bridge_slave_1 entered promiscuous mode [ 2119.302870] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2119.312827] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2119.347028] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2119.373965] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2119.383899] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2119.393157] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2119.401832] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2119.409669] team0: Port device team_slave_0 added [ 2119.442525] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2119.449991] team0: Port device team_slave_1 added [ 2119.455446] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2119.463121] team0: Port device team_slave_0 added [ 2119.470413] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2119.478146] team0: Port device team_slave_1 added [ 2119.483527] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2119.491742] team0: Port device team_slave_0 added [ 2119.497449] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2119.504981] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2119.512766] team0: Port device team_slave_1 added [ 2119.518369] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2119.525905] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2119.533469] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2119.541092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2119.559664] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2119.638838] device hsr_slave_0 entered promiscuous mode [ 2119.676279] device hsr_slave_1 entered promiscuous mode [ 2119.768916] device hsr_slave_0 entered promiscuous mode [ 2119.816202] device hsr_slave_1 entered promiscuous mode [ 2119.867402] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2119.909222] device hsr_slave_0 entered promiscuous mode [ 2119.946654] device hsr_slave_1 entered promiscuous mode [ 2119.987385] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2119.995007] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2120.002490] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2120.011352] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2120.023102] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2120.046135] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2120.063767] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2120.073114] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2120.161977] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2120.169026] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2120.218804] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2120.277309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2120.289590] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2120.295844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2120.304816] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2120.321570] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2120.332643] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2120.352307] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2120.369722] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2120.390974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2120.398647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2120.409205] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2120.416669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2120.423730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2120.435040] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2120.446158] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2120.452322] 8021q: adding VLAN 0 to HW filter on device team0 [ 2120.460584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2120.468992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2120.479806] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2120.490137] 8021q: adding VLAN 0 to HW filter on device team0 [ 2120.503170] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2120.510353] 8021q: adding VLAN 0 to HW filter on device team0 [ 2120.520920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2120.530715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2120.539458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2120.553550] bridge0: port 1(bridge_slave_0) entered blocking state [ 2120.560039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2120.576617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2120.585329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2120.593820] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2120.617606] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2120.624829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2120.633773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2120.649561] bridge0: port 1(bridge_slave_0) entered blocking state [ 2120.656035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2120.671653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2120.682118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2120.698207] bridge0: port 2(bridge_slave_1) entered blocking state [ 2120.704651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2120.716570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2120.724636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2120.732939] bridge0: port 1(bridge_slave_0) entered blocking state [ 2120.739400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2120.749858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2120.760029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2120.772125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2120.780369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2120.788785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2120.800898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2120.812692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2120.830193] bridge0: port 2(bridge_slave_1) entered blocking state [ 2120.836646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2120.844298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2120.852630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2120.861136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2120.869388] bridge0: port 2(bridge_slave_1) entered blocking state [ 2120.875834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2120.886082] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2120.904564] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2120.914693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2120.936690] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2120.943757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2120.954366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2120.963391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2120.972226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2120.986776] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2120.994850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2121.005359] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2121.014412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2121.027092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2121.034995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2121.043426] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2121.051844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2121.069298] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2121.084015] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2121.098462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2121.106152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2121.114251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2121.125028] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2121.133876] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2121.145630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2121.153531] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2121.161888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2121.170606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2121.179117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2121.187779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2121.195617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2121.204272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2121.215076] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2121.224748] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2121.235238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2121.243640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2121.252203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2121.263548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2121.276229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2121.283952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2121.299488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2121.314257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2121.328764] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2121.347494] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2121.354443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2121.370728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2121.383548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2121.402648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2121.414408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2121.430870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2121.444039] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2121.459151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2121.481217] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2121.492077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2121.504893] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2121.519196] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2121.541480] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2121.571226] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2121.610220] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2121.617580] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2121.625504] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2121.650480] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2121.741708] kernel msg: ebtables bug: please report to author: bad policy [ 2121.764308] kernel msg: ebtables bug: please report to author: bad policy [ 2121.773768] kernel msg: ebtables bug: please report to author: bad policy 21:15:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000100)) ioctl(r0, 0x1000008916, &(0x7f0000000240)="0adc1f023c123f3188a070") r2 = socket(0x40000000015, 0x805, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000040)={'team_slave_1\x00', 0x401}) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000140)=0x7) getsockopt(r2, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:15:59 executing program 0: r0 = socket(0x4, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0xffffffffffffff70, @ipv4={[], [], @loopback}, 0x240b40000000}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2000, 0x0) 21:15:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xc0045878, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:59 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2121.805008] kernel msg: ebtables bug: please report to author: bad policy 21:15:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:15:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2121.888862] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2121.914377] kernel msg: ebtables bug: please report to author: bad policy [ 2121.931531] kernel msg: ebtables bug: please report to author: bad policy 21:15:59 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:15:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2, 0x6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f00000000c0)={0x2, @time, 0x9, {0x4, 0x9}, 0x7, 0x2, 0x9}) [ 2121.954458] kernel msg: ebtables bug: please report to author: bad policy 21:15:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:59 executing program 0: r0 = socket(0xfffffffbffffffff, 0x3, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2122.106169] kernel msg: ebtables bug: please report to author: bad policy [ 2122.133961] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2122.136640] kernel msg: ebtables bug: please report to author: bad policy 21:15:59 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2122.178328] kernel msg: ebtables bug: please report to author: bad policy 21:15:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:15:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000100)) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x8}}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c020000", @ANYRES16=r3, @ANYBLOB="080327bd7000ffdbdf25020000003800060004000200080001008100000004000200080001000600000004000200080001000000008004000200080001004900000004000200"], 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40004) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r4 = socket(0x1d, 0x1000001000805, 0x1) getsockopt(r4, 0x115, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xd) write$P9_RLINK(r1, &(0x7f00000002c0)={0x7, 0x47, 0x1}, 0x7) 21:15:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xc0189436, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:15:59 executing program 0: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x72, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000100)={{0x67, @multicast1, 0x4e24, 0x1, 'lc\x00', 0x30, 0x4, 0x57}, {@empty, 0x4e23, 0x2, 0x0, 0x7, 0x87}}, 0x44) r1 = socket(0x10040000000015, 0xfffffffffffffffe, 0x1158) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000080)="594411dd192dcaade765b3c124902494", 0x10) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x20) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) ioctl$KDSETLED(r2, 0x4b32, 0x8001) ioctl$RTC_AIE_ON(r2, 0x7001) getsockopt(r1, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:15:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2122.261891] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:16:00 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2122.360253] kernel msg: ebtables bug: please report to author: bad policy [ 2122.411720] kernel msg: ebtables bug: please report to author: bad policy 21:16:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2122.453641] kernel msg: ebtables bug: please report to author: bad policy [ 2122.462238] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:16:00 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:16:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0xa, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) fcntl$setsig(r1, 0xa, 0xe) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f00000000c0)={0x5, 0x0, 0x9781, 0x884, 'syz0\x00', 0x8000}) 21:16:00 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) sendto$inet(r0, &(0x7f0000000080)="76779948a3064c26ceb4d23e66397ec56adaa841c86aebf1eac9524f6913c44e07cd039e0c2cea7ab05dc4cdc558ceaaa46fd326a30329abc69993a078cda281c9d4abffe8936a8f6fbdb681f820cb990971cfaec74ca58deed0877f7c0c417d34f43351ec56635abb5c724f2146de1b80d8a25b8f7ee34e556b15658ce9dbc63a2323880f8551bfd335adbaaa34fb551ac1664504422aae330359595b93198eb81ebdc5209831d7f70a26f73f2f6629d14f62dcd8", 0xb5, 0x4000040, &(0x7f0000000140)={0x2, 0x4e24, @local}, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x121000, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:16:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:16:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:16:00 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2122.656652] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:16:00 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000), &(0x7f00000003c0)=0xfffffffffffffd33) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) getsockopt(0xffffffffffffffff, 0x116, 0x7ff, 0x0, &(0x7f0000000080)=0xffffffffffffff22) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73797a30b55f603ba8bbc3d0c1adb8c7e10ac7d3e25eb14ec423e5cc6170b31247262100000000000000000000"], 0x2c) [ 2122.710325] kernel msg: ebtables bug: please report to author: bad policy 21:16:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xc018ae85, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:16:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x8}, &(0x7f0000000140)=0x8) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x682000, 0x0) getdents(r3, &(0x7f0000000280)=""/109, 0x6d) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x0, {0x2, 0x4e20, @rand_addr=0x7}, 'veth1_to_team\x00'}) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r2}, 0x5a) r4 = semget(0x0, 0x4, 0x82) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000300)=[0x2, 0x4, 0x7, 0xc0000000, 0x294, 0xfff]) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r5 = socket(0x40000000015, 0x805, 0x0) getsockopt(r5, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2122.774791] kernel msg: ebtables bug: please report to author: bad policy 21:16:00 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2122.833125] kernel msg: ebtables bug: please report to author: bad policy [ 2122.850399] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2122.875970] kernel msg: ebtables bug: please report to author: bad policy 21:16:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) getsockopt(r0, 0x6, 0x2710, &(0x7f0000000100)=""/13, &(0x7f0000000140)=0xfffffffffffffea5) 21:16:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:16:00 executing program 0: r0 = socket(0xb, 0x80007, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x180, r1, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x24}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x800}, 0x4008000) 21:16:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2123.026932] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:16:00 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:16:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x1) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000039d397b364", @ANYRES16=r2, @ANYBLOB="000528bd7000fcdbdf2511000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x1) r3 = socket(0x9, 0x806, 0x3) getsockopt(r3, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2123.119299] kernel msg: ebtables bug: please report to author: bad policy [ 2123.127380] kernel msg: ebtables bug: please report to author: bad policy 21:16:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:16:00 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3e4, 0x20000) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x81) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, 0x0, &(0x7f0000000000)) 21:16:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xc020660b, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) [ 2123.167686] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2123.186153] kernel msg: ebtables bug: please report to author: bad policy 21:16:00 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:16:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2123.300506] kernel msg: ebtables bug: please report to author: bad policy 21:16:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="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") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) [ 2123.348324] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:16:01 executing program 0: socket(0x8, 0xe, 0x9) r0 = socket(0x40000000015, 0x803, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) socket(0x9, 0x805, 0x5) memfd_create(&(0x7f00000000c0)='\x00', 0x5) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000140)={0x2, 0xcb}) [ 2123.393961] kernel msg: ebtables bug: please report to author: bad policy 21:16:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:16:01 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2123.435196] kernel msg: ebtables bug: please report to author: bad policy 21:16:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40, 0x0) [ 2123.547548] kernel msg: ebtables bug: please report to author: bad policy [ 2123.580524] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2123.588070] kernel msg: ebtables bug: please report to author: bad policy 21:16:01 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@local, @mcast2, @remote, 0x0, 0x9, 0x0, 0x500, 0x9, 0x10, r1}) 21:16:01 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:16:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:16:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x2) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:16:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:16:01 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x0, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x84}, 0x4004040) 21:16:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0xa278, 0x81}, {0x460d, 0x7159}]}, 0x14, 0x3) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x100000001, 0x5}, {0xdc, 0x2}], r1}, 0x18, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x300, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x8840) getsockopt(r2, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f00000000c0)=0xb371f9891d862783) [ 2123.758580] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:16:01 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2123.856834] kernel msg: ebtables bug: please report to author: bad policy [ 2123.932498] kernel msg: ebtables bug: please report to author: bad policy [ 2123.950561] kernel msg: ebtables bug: please report to author: bad policy 21:16:01 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) [ 2123.979550] kernel msg: ebtables bug: please report to author: bad policy 21:16:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2124.054223] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:16:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2124.124581] kernel msg: ebtables bug: please report to author: bad policy 21:16:01 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x86842, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000080)=0x5) 21:16:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000000c0)={0x2, 0x0, [0x91, 0x42, 0xfffffffffffffffe, 0x10001, 0xfffffffffffffff9, 0x0, 0x100000001, 0x86b]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000001c0)) timerfd_settime(r0, 0x1, &(0x7f0000000140)={{0x77359400}}, &(0x7f0000000180)) 21:16:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x3) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:16:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2124.167919] kernel msg: ebtables bug: please report to author: bad policy [ 2124.249440] kernel msg: ebtables bug: please report to author: bad policy [ 2124.260128] kernel msg: ebtables bug: please report to author: bad policy 21:16:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:16:01 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2124.301333] kernel msg: ebtables bug: please report to author: bad policy [ 2124.327067] device bridge_slave_1 left promiscuous mode [ 2124.332681] bridge0: port 2(bridge_slave_1) entered disabled state 21:16:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000002000000038000000010001007eae59abb71dbbfad2f21200fbafc74327ab1f162bb9c6157722ba9c50969cd6009500870e98e2835d682347dc02ed4c709b3beca044e9829bfe6fd9a535f4acc53cbdfee9e0854168f3586dfd53867722508f1729ba85835af62a599096788e4c783ee31b23a745cf56eab0b2a55c395246abb6b5efecc507850f05e4554c8b293d01ec5b68bcd5e0ab125c866347a7562d226d2dd95d494cd3046a832e895562649e1473c9af9207ac3a836c710c85ff70896a88a3f70de1d04194e95b0c74bf7efeca1f3b9d2d75fe79406c98f40f5d2ca5f8af0344062e195b9955827832eaa33f5f059b85c2916798be92bd26734bed1ea10819f9271d68ec6a277dd822"], &(0x7f0000000080)=""/151, 0x3b, 0x97, 0x1}, 0x20) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)=0xffffffffffffff59) 21:16:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x80) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000280)={r2, 0x2, 0xc8f2, 0x1, 0x8b9, 0x5}, &(0x7f00000002c0)=0x14) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0xc0002, 0x0) name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)={0x195, 0x1, "8fc0c21d829340dc8250e7cb24d0bf0a7534d07501d77c796a681446f3fecd09c5021d1db7753eae7c182a52b0da93f25ddbf6"}, &(0x7f0000000140), 0x400) socket(0x40000000015, 0x805, 0x0) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f00000000c0)) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000300)=0xd) 21:16:02 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2124.395287] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2124.401261] kernel msg: ebtables bug: please report to author: bad policy [ 2124.449116] kernel msg: ebtables bug: please report to author: bad policy [ 2124.466031] device bridge_slave_0 left promiscuous mode [ 2124.472161] bridge0: port 1(bridge_slave_0) entered disabled state [ 2124.494596] kernel msg: ebtables bug: please report to author: bad policy 21:16:02 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) [ 2124.522586] kernel msg: ebtables bug: please report to author: Hook order must be followed 21:16:02 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 2124.632759] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2124.782070] device hsr_slave_1 left promiscuous mode [ 2124.830569] device hsr_slave_0 left promiscuous mode [ 2124.881810] team0 (unregistering): Port device team_slave_1 removed [ 2124.895174] team0 (unregistering): Port device team_slave_0 removed [ 2124.907588] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2124.941672] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2125.037505] bond0 (unregistering): Released all slaves 21:16:02 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) 21:16:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x4) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) modify_ldt$write2(0x11, &(0x7f0000000440)={0x35, 0x1000, 0x0, 0x7fffffff, 0x25b, 0x8, 0x5, 0x81, 0x2, 0x2}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x6, 0xfffffffffffffff7, 0xffffffff00000000}, 0x3, [0x0, 0x10000, 0x0, 0x6533, 0xccc, 0x1f, 0x3, 0x0, 0x8000, 0x9, 0x9, 0x10000, 0xffffffffffff4da5, 0x101, 0x9d, 0x7fffffff, 0x9, 0x1, 0xec73, 0xff, 0x100000000, 0x8, 0x3ff, 0x8000, 0x3, 0x80000001, 0x7, 0x3, 0x5, 0x3, 0x1, 0xcb, 0x4c203d23, 0xa21, 0x3, 0x101, 0xe0000, 0x4, 0x1, 0xb1, 0x4, 0xfffffffffffffffa, 0xffffffffffff4825, 0x3, 0x4, 0x791, 0x8, 0xe8f, 0xf3, 0x0, 0x5, 0x9, 0x0, 0xfffffffffffffff8, 0x2, 0x2, 0x3, 0x3, 0x9e, 0x4, 0x0, 0xe2, 0x0, 0x7ff], [0x4, 0x7ff, 0x20, 0x2, 0xfff, 0x100, 0x1, 0x100, 0x3f, 0x671b, 0x80000001, 0x10000, 0x1f, 0x5, 0x5, 0xf0d0, 0x5, 0x6, 0x7, 0x1, 0x5, 0x5, 0x7, 0x0, 0x7f, 0x20, 0x3, 0x100000000, 0x100000000, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4e40000000, 0xecde, 0x1ff, 0x1000, 0x3, 0xe6a8, 0x8, 0xfff, 0x7, 0x1, 0x4, 0x0, 0x400, 0xff, 0x3, 0xffff, 0x10000000, 0x100, 0x8, 0x2, 0x7fffffff, 0xffffffffffffffc0, 0x10000, 0x2, 0xffff, 0x8, 0x1, 0xfbc4, 0x3, 0x5], [0x7f, 0x2, 0x180, 0x0, 0x1, 0x764, 0x3, 0x2, 0x342, 0x3, 0x9, 0x7d, 0xfffffffffffffe00, 0x6, 0x2, 0x2, 0x2, 0x80, 0xa25, 0x7dea, 0xd653, 0xfa71, 0x7f, 0x100000001, 0x7, 0x9, 0x80, 0x10001, 0x800, 0xfffffffffffffe00, 0x7fff, 0x1, 0x400, 0x8, 0x7, 0xff, 0x6, 0x0, 0x9, 0x2b, 0x3, 0x35, 0x4, 0xea, 0x0, 0x7fffffff, 0x7, 0x8001, 0x8001, 0xffff, 0xac, 0x1f, 0x4, 0x10000, 0x40, 0x2, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x7fff, 0x3f, 0x6, 0x4], [0x6, 0x6, 0xde, 0x7, 0x40, 0x81, 0x0, 0x3ff, 0x100000001, 0x1ce00000000, 0x3f, 0x3, 0x4, 0x7, 0x7, 0x2, 0x41f81763, 0x4, 0x200, 0x5, 0x6, 0xfff, 0x5, 0x2, 0x80, 0x8, 0x401, 0x400, 0x0, 0xa54, 0x8000, 0x1000, 0xfff, 0x9, 0x7, 0x0, 0x7, 0x4, 0x1, 0x3, 0x100000000, 0x5, 0x7, 0x68, 0x3, 0x101, 0x1, 0xfffffffffffffffa, 0x9, 0x100, 0x5, 0x4, 0x1, 0x4, 0x487, 0x4, 0x9, 0x8, 0x8, 0x1, 0x6, 0x2, 0x3, 0x3f]}, 0x45c) creat(&(0x7f0000000040)='./file0\x00', 0x102) 21:16:02 executing program 4: setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) 21:16:02 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x914, 0x8, 0x0, &(0x7f0000000080)=0xf2) 21:16:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) 21:16:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2040, 0x110) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xfcfe) 21:16:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2125.245513] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 2125.269727] WARNING: CPU: 0 PID: 31959 at net/batman-adv/multicast.c:371 batadv_mcast_mla_update+0x20ed/0x2980 [ 2125.280801] Kernel panic - not syncing: panic_on_warn set ... [ 2125.280828] kobject: 'loop5' (00000000c9f48ae5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2125.286699] CPU: 0 PID: 31959 Comm: kworker/u4:7 Not tainted 5.0.0-rc2+ #28 [ 2125.286712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2125.286731] Workqueue: bat_events batadv_mcast_mla_update [ 2125.286738] Call Trace: [ 2125.286754] dump_stack+0x1db/0x2d0 [ 2125.286769] ? dump_stack_print_info.cold+0x20/0x20 [ 2125.286789] ? batadv_mcast_mla_update+0x20b0/0x2980 [ 2125.315618] kernel msg: ebtables bug: please report to author: bad policy [ 2125.318270] panic+0x2cb/0x65c 21:16:03 executing program 0: socket(0x40000000015, 0x805, 0x0) 21:16:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}, {}]}, 0x108) [ 2125.318286] ? add_taint.cold+0x16/0x16 [ 2125.318307] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 2125.318320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2125.318349] ? __probe_kernel_read+0x1f4/0x250 [ 2125.340217] kernel msg: ebtables bug: please report to author: bad policy [ 2125.341614] ? __warn.cold+0x5/0x48 [ 2125.341629] ? __warn+0xe8/0x1d0 [ 2125.341651] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 2125.347526] kernel msg: ebtables bug: please report to author: bad policy [ 2125.348858] __warn.cold+0x20/0x48 [ 2125.348876] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 2125.348891] report_bug+0x263/0x2b0 [ 2125.364786] kernel msg: ebtables bug: please report to author: bad policy [ 2125.371051] do_error_trap+0x11b/0x200 [ 2125.371069] do_invalid_op+0x37/0x50 [ 2125.371084] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 2125.371099] invalid_op+0x14/0x20 [ 2125.371115] RIP: 0010:batadv_mcast_mla_update+0x20ed/0x2980 21:16:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2125.371128] Code: 49 c1 ee 03 48 b8 00 00 00 00 00 fc ff df be f8 f8 ff ff 66 41 89 34 06 48 c1 ea 03 c6 04 02 f8 e9 87 ea ff ff e8 b3 b0 af f9 <0f> 0b e9 cf e6 ff ff e8 a7 b0 af f9 48 8b 95 00 fe ff ff 49 c1 ee [ 2125.371139] RSP: 0000:ffff8880498d7788 EFLAGS: 00010293 [ 2125.390131] kobject: 'loop0' (00000000c93a7860): kobject_uevent_env [ 2125.390351] RAX: ffff888051d2c1c0 RBX: 0000000000000001 RCX: ffffffff87d2350a [ 2125.393915] kobject: 'loop0' (00000000c93a7860): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2125.398985] RDX: 0000000000000000 RSI: ffffffff87d24e3d RDI: 0000000000000007 [ 2125.398993] RBP: ffff8880498d79e0 R08: ffff888051d2c1c0 R09: ffff888051d2ca88 21:16:03 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000000)) socket$nl_crypto(0x10, 0x3, 0x15) [ 2125.399001] R10: ffff888051d2c1c0 R11: 0000000000000000 R12: ffff8880498d7868 [ 2125.399008] R13: 0000000000000000 R14: 1ffff1100931af0d R15: ffff8880498d79b8 [ 2125.399035] ? batadv_mcast_mla_update+0x7ba/0x2980 [ 2125.399047] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 2125.399062] ? batadv_mcast_mla_update+0x20ed/0x2980 [ 2125.399085] ? batadv_mcast_querier_log.isra.0+0x140/0x140 [ 2125.451319] kobject: 'loop5' (00000000c9f48ae5): kobject_uevent_env [ 2125.455783] ? trace_hardirqs_off+0xb8/0x310 [ 2125.455798] ? kasan_check_read+0x11/0x20 21:16:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$dri(0x0, 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}]}, 0x108) [ 2125.455815] ? do_raw_spin_unlock+0xa0/0x330 [ 2125.455851] ? process_one_work+0xbf1/0x1ce0 [ 2125.455866] ? find_held_lock+0x35/0x120 [ 2125.455883] ? add_lock_to_list.isra.0+0x450/0x450 [ 2125.462434] kobject: 'loop5' (00000000c9f48ae5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2125.469662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2125.469674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2125.469692] ? check_preemption_disabled+0x48/0x290 [ 2125.469712] ? __lock_is_held+0xb6/0x140 [ 2125.469738] process_one_work+0xd0c/0x1ce0 [ 2125.469756] ? preempt_notifier_register+0x200/0x200 [ 2125.505985] kernel msg: ebtables bug: please report to author: bad policy [ 2125.508431] ? __switch_to_asm+0x34/0x70 [ 2125.508460] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 2125.508473] ? __schedule+0x89f/0x1e60 [ 2125.508492] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2125.522483] kernel msg: ebtables bug: please report to author: bad policy [ 2125.524002] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2125.524023] ? worker_thread+0x3b7/0x14a0 [ 2125.524040] ? find_held_lock+0x35/0x120 [ 2125.524062] ? lock_acquire+0x1db/0x570 [ 2125.534666] kobject: 'loop0' (00000000c93a7860): kobject_uevent_env [ 2125.536106] ? worker_thread+0x3cd/0x14a0 [ 2125.536125] ? kasan_check_read+0x11/0x20 [ 2125.536139] ? do_raw_spin_lock+0x156/0x360 [ 2125.536149] ? lock_release+0xc40/0xc40 [ 2125.536164] ? rwlock_bug.part.0+0x90/0x90 [ 2125.540663] kobject: 'loop0' (00000000c93a7860): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2125.544713] ? trace_hardirqs_on_caller+0x310/0x310 [ 2125.544740] worker_thread+0x143/0x14a0 [ 2125.544768] ? process_one_work+0x1ce0/0x1ce0 [ 2125.594987] kobject: 'loop5' (00000000c9f48ae5): kobject_uevent_env [ 2125.596381] ? __kthread_parkme+0xc3/0x1b0 [ 2125.596399] ? lock_acquire+0x1db/0x570 [ 2125.596416] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2125.596430] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2125.596443] ? trace_hardirqs_on+0xbd/0x310 [ 2125.596456] ? __kthread_parkme+0xc3/0x1b0 [ 2125.601585] kobject: 'loop5' (00000000c9f48ae5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2125.608497] ? trace_hardirqs_off_caller+0x300/0x300 [ 2125.608518] ? do_raw_spin_trylock+0x270/0x270 [ 2125.608542] ? schedule+0x108/0x350 [ 2125.608577] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2125.654094] kernel msg: ebtables bug: please report to author: bad policy [ 2125.656877] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2125.656915] ? __kthread_parkme+0xfb/0x1b0 [ 2125.656930] kthread+0x357/0x430 [ 2125.656962] ? process_one_work+0x1ce0/0x1ce0 [ 2125.680714] kernel msg: ebtables bug: please report to author: bad policy [ 2125.687366] ? kthread_stop+0x920/0x920 [ 2125.687392] ret_from_fork+0x3a/0x50 [ 2125.694131] Kernel Offset: disabled [ 2125.805705] Rebooting in 86400 seconds..