, &(0x7f0000000040)='/dev/sequencer\x00', 0x400100, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x5, 'syz1\x00', @default, 0xfff, 0x6, [@null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) [ 3333.138859] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3333.177052] FAULT_INJECTION: forcing a failure. [ 3333.177052] name failslab, interval 1, probability 0, space 0, times 0 10:42:26 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x76, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3333.252342] CPU: 0 PID: 19797 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #34 [ 3333.259577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3333.268940] Call Trace: [ 3333.271534] dump_stack+0x1db/0x2d0 [ 3333.275185] ? dump_stack_print_info.cold+0x20/0x20 [ 3333.280200] ? percpu_ref_put_many+0x129/0x270 [ 3333.284804] should_fail.cold+0xa/0x15 [ 3333.288692] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3333.293798] ? ___might_sleep+0x1e7/0x310 [ 3333.297962] ? arch_local_save_flags+0x50/0x50 [ 3333.302554] __should_failslab+0x121/0x190 [ 3333.306792] should_failslab+0x9/0x14 [ 3333.310614] kmem_cache_alloc+0x2be/0x710 [ 3333.314767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3333.320350] ? kvm_is_reserved_pfn+0x144/0x1c0 [ 3333.324938] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3333.330488] mmu_topup_memory_caches+0x97/0x490 [ 3333.335163] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3333.340709] kvm_mmu_load+0x21/0x1200 [ 3333.344514] ? kvm_apic_accept_pic_intr+0xef/0x1a0 [ 3333.349450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3333.354978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3333.360521] vcpu_enter_guest+0x3f0e/0x6520 [ 3333.364877] ? emulator_read_emulated+0x50/0x50 [ 3333.369552] ? add_lock_to_list.isra.0+0x450/0x450 [ 3333.374501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3333.380050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3333.385579] ? check_preemption_disabled+0x48/0x290 [ 3333.390590] ? __lock_is_held+0xb6/0x140 [ 3333.394677] ? lock_acquire+0x1db/0x570 [ 3333.398658] ? kvm_arch_vcpu_ioctl_run+0x240/0x16e0 [ 3333.403679] ? lock_release+0xc40/0xc40 [ 3333.407646] ? kvm_gen_update_masterclock+0x380/0x380 [ 3333.412828] ? rcu_sync_dtor+0x170/0x170 [ 3333.416913] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3333.421746] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3333.426762] kvm_vcpu_ioctl+0x558/0x12d0 [ 3333.430821] ? kvm_vcpu_block+0x1010/0x1010 [ 3333.435142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3333.440674] ? lock_downgrade+0x910/0x910 [ 3333.444812] ? kasan_check_read+0x11/0x20 [ 3333.448980] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3333.454259] ? rcu_read_unlock_special+0x380/0x380 [ 3333.459203] ? __fget+0x499/0x710 [ 3333.462669] ? iterate_fd+0x4b0/0x4b0 [ 3333.466465] ? kvm_vcpu_block+0x1010/0x1010 [ 3333.470798] do_vfs_ioctl+0x107b/0x17d0 [ 3333.474770] ? wait_for_completion+0x810/0x810 [ 3333.479369] ? ioctl_preallocate+0x2f0/0x2f0 [ 3333.483772] ? smack_inode_setattr+0x290/0x290 [ 3333.488350] ? __fget_light+0x2db/0x420 [ 3333.492356] ? fget_raw+0x20/0x20 [ 3333.495821] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3333.501367] ? fput+0x128/0x1a0 [ 3333.504642] ? do_syscall_64+0x8c/0x800 [ 3333.508616] ? do_syscall_64+0x8c/0x800 [ 3333.512599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3333.518129] ? security_file_ioctl+0x93/0xc0 [ 3333.522570] ksys_ioctl+0xab/0xd0 [ 3333.526054] __x64_sys_ioctl+0x73/0xb0 [ 3333.529950] do_syscall_64+0x1a3/0x800 [ 3333.533834] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3333.538756] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3333.543767] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3333.548635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3333.553829] RIP: 0033:0x458099 [ 3333.557030] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3333.575933] RSP: 002b:00007fd857aeec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3333.583636] RAX: ffffffffffffffda RBX: 00007fd857aeec90 RCX: 0000000000458099 [ 3333.590927] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 10:42:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:26 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x77, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3333.598184] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3333.605442] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd857aef6d4 [ 3333.612724] R13: 00000000004c1016 R14: 00000000004d2c38 R15: 0000000000000006 10:42:26 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3333.767201] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000340)) 10:42:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x8, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000cfd000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000140)) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4000000203, &(0x7f0000000240)) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x1) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000600)="f95e0139fa7af261f6ed534b45e15c3b90ef064a30515b8a92ddccfb83d9a7ea9cf8730f0bb5a208f067a3fc5fe3861130fe9653824b2a8a9dceed203d10ba3d991192c9fe9135f23e9caa900c617cbcfe040f3d52ff6aeb96", 0x59, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000680)="74d1f36114c27a1ed317970050e154f41c8d673f680ff5934c080a163d9ac030b66f7239e11f4e3205bba780dd8600344a95dc7cbd8b1e47f5186867228aef82ae32e18492f6d14d8bae2b741f423f4b24ca0f3255a01f5ea1306d0dcc61dbf4e680787d6ab9bf1cfdbb592ded2ccd7fa3bda4654a", 0x75) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) dup2(r3, 0xffffffffffffffff) fdatasync(0xffffffffffffffff) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c832, 0xffffffffffffffff, 0x0) 10:42:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x78, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:27 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:27 executing program 3 (fault-call:7 fault-nth:5): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:42:27 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3334.090219] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000340)) 10:42:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x79, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3334.338617] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000340)) 10:42:27 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3334.384727] FAULT_INJECTION: forcing a failure. [ 3334.384727] name failslab, interval 1, probability 0, space 0, times 0 [ 3334.407139] CPU: 1 PID: 19860 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #34 [ 3334.414350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3334.414358] Call Trace: [ 3334.414380] dump_stack+0x1db/0x2d0 [ 3334.414418] ? dump_stack_print_info.cold+0x20/0x20 [ 3334.414433] ? percpu_ref_put_many+0x129/0x270 [ 3334.414467] should_fail.cold+0xa/0x15 [ 3334.426399] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3334.426434] ? ___might_sleep+0x1e7/0x310 [ 3334.426448] ? arch_local_save_flags+0x50/0x50 [ 3334.426483] __should_failslab+0x121/0x190 [ 3334.426500] should_failslab+0x9/0x14 [ 3334.426514] kmem_cache_alloc+0x2be/0x710 [ 3334.457414] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3334.465415] ? kvm_is_reserved_pfn+0x144/0x1c0 [ 3334.465430] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 10:42:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x7a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3334.465450] mmu_topup_memory_caches+0x97/0x490 [ 3334.465462] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3334.465479] kvm_mmu_load+0x21/0x1200 [ 3334.465495] ? kvm_apic_accept_pic_intr+0xef/0x1a0 [ 3334.504164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3334.509739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3334.515282] vcpu_enter_guest+0x3f0e/0x6520 [ 3334.519622] ? emulator_read_emulated+0x50/0x50 [ 3334.524291] ? add_lock_to_list.isra.0+0x450/0x450 [ 3334.529228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3334.534796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3334.540355] ? check_preemption_disabled+0x48/0x290 [ 3334.545391] ? __lock_is_held+0xb6/0x140 [ 3334.545408] ? lock_acquire+0x1db/0x570 [ 3334.545420] ? kvm_arch_vcpu_ioctl_run+0x240/0x16e0 [ 3334.545436] ? lock_release+0xc40/0xc40 [ 3334.545463] ? kvm_gen_update_masterclock+0x380/0x380 [ 3334.545496] ? rcu_sync_dtor+0x170/0x170 [ 3334.571721] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3334.576579] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3334.581632] kvm_vcpu_ioctl+0x558/0x12d0 [ 3334.585703] ? kvm_vcpu_block+0x1010/0x1010 [ 3334.590035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3334.595593] ? lock_downgrade+0x910/0x910 [ 3334.599743] ? kasan_check_read+0x11/0x20 [ 3334.603891] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3334.609191] ? rcu_read_unlock_special+0x380/0x380 [ 3334.614147] ? __fget+0x499/0x710 [ 3334.617611] ? iterate_fd+0x4b0/0x4b0 [ 3334.621420] ? kvm_vcpu_block+0x1010/0x1010 [ 3334.625750] do_vfs_ioctl+0x107b/0x17d0 [ 3334.629729] ? wait_for_completion+0x810/0x810 [ 3334.634335] ? ioctl_preallocate+0x2f0/0x2f0 [ 3334.638746] ? smack_inode_setattr+0x290/0x290 [ 3334.643325] ? __fget_light+0x2db/0x420 [ 3334.647303] ? fget_raw+0x20/0x20 [ 3334.650821] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3334.656377] ? fput+0x128/0x1a0 [ 3334.659670] ? do_syscall_64+0x8c/0x800 [ 3334.663658] ? do_syscall_64+0x8c/0x800 [ 3334.667694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3334.673225] ? security_file_ioctl+0x93/0xc0 [ 3334.677633] ksys_ioctl+0xab/0xd0 [ 3334.681091] __x64_sys_ioctl+0x73/0xb0 [ 3334.684982] do_syscall_64+0x1a3/0x800 [ 3334.688900] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3334.693839] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3334.698874] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3334.703755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3334.708975] RIP: 0033:0x458099 [ 3334.712166] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3334.731061] RSP: 002b:00007fd857aeec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3334.738776] RAX: ffffffffffffffda RBX: 00007fd857aeec90 RCX: 0000000000458099 [ 3334.746052] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 3334.753329] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3334.760606] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd857aef6d4 [ 3334.767882] R13: 00000000004c1016 R14: 00000000004d2c38 R15: 0000000000000006 [ 3334.774309] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:27 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x80200, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000140)=@fragment={0x2e, 0x0, 0x2, 0xa, 0x0, 0x5, 0x66}, 0x8) socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x5}, 0x20) 10:42:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:27 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000040)={r2, 0x80000, r0}) 10:42:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x7b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3334.801075] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:28 executing program 3 (fault-call:7 fault-nth:6): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:42:28 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x7c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:28 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syslog(0x2, &(0x7f0000000180)=""/224, 0xe0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7f, 0xa0341) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x2) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0xa736}, 0x8) 10:42:28 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc04064c9, &(0x7f0000000000)={0x2, 0x0, 0x100000000000000, 0x355, 0x0, 0xfffffffffffffd0e, 0x0, 0xffffffffffffffd0, 0x0}) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1000, 0x4000) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000080)={0x1, 0x5, [@broadcast, @random="47dc41cfa559", @empty, @broadcast, @link_local]}) [ 3335.005760] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3335.066541] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x7d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:28 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0x10, 0x4, 0x4, 0x8}, 0x2c) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x40000, 0x0) keyctl$set_timeout(0xf, r1, 0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) faccessat(r2, &(0x7f0000000000)='./file0\x00', 0x8, 0x0) 10:42:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x48b, 0x1c000000000]}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000080)={'filter\x00', 0x0, 0x0, 0x0, [], 0x14b, &(0x7f0000000040)=[{}, {}, {}]}, 0xffffffffffffffba) [ 3335.331600] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3335.360705] FAULT_INJECTION: forcing a failure. [ 3335.360705] name failslab, interval 1, probability 0, space 0, times 0 [ 3335.378675] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3335.402731] CPU: 0 PID: 19923 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #34 [ 3335.409928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3335.419278] Call Trace: [ 3335.421914] dump_stack+0x1db/0x2d0 [ 3335.425552] ? dump_stack_print_info.cold+0x20/0x20 [ 3335.430582] ? percpu_ref_put_many+0x129/0x270 [ 3335.435172] should_fail.cold+0xa/0x15 [ 3335.439083] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3335.444244] ? ___might_sleep+0x1e7/0x310 [ 3335.448397] ? arch_local_save_flags+0x50/0x50 [ 3335.453000] __should_failslab+0x121/0x190 [ 3335.457251] should_failslab+0x9/0x14 [ 3335.461092] kmem_cache_alloc+0x2be/0x710 [ 3335.465245] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3335.470811] ? kvm_is_reserved_pfn+0x144/0x1c0 [ 3335.475391] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3335.480954] mmu_topup_memory_caches+0x97/0x490 [ 3335.485700] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3335.491269] kvm_mmu_load+0x21/0x1200 [ 3335.495107] ? kvm_apic_accept_pic_intr+0xef/0x1a0 [ 3335.500058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3335.505596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3335.511137] vcpu_enter_guest+0x3f0e/0x6520 [ 3335.515507] ? emulator_read_emulated+0x50/0x50 [ 3335.520168] ? add_lock_to_list.isra.0+0x450/0x450 [ 3335.525094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3335.530621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3335.536166] ? check_preemption_disabled+0x48/0x290 [ 3335.541184] ? __lock_is_held+0xb6/0x140 [ 3335.545256] ? lock_acquire+0x1db/0x570 [ 3335.549242] ? kvm_arch_vcpu_ioctl_run+0x240/0x16e0 [ 3335.554257] ? lock_release+0xc40/0xc40 [ 3335.558275] ? kvm_gen_update_masterclock+0x380/0x380 [ 3335.563489] ? rcu_sync_dtor+0x170/0x170 [ 3335.567545] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3335.572375] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3335.577391] kvm_vcpu_ioctl+0x558/0x12d0 [ 3335.581450] ? kvm_vcpu_block+0x1010/0x1010 [ 3335.585782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3335.591316] ? lock_downgrade+0x910/0x910 [ 3335.595457] ? kasan_check_read+0x11/0x20 [ 3335.599604] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3335.604901] ? rcu_read_unlock_special+0x380/0x380 [ 3335.609835] ? __fget+0x499/0x710 [ 3335.613303] ? iterate_fd+0x4b0/0x4b0 [ 3335.617120] ? kvm_vcpu_block+0x1010/0x1010 [ 3335.621437] do_vfs_ioctl+0x107b/0x17d0 [ 3335.625432] ? wait_for_completion+0x810/0x810 [ 3335.630007] ? ioctl_preallocate+0x2f0/0x2f0 [ 3335.634460] ? smack_inode_setattr+0x290/0x290 [ 3335.639040] ? __fget_light+0x2db/0x420 [ 3335.643070] ? fget_raw+0x20/0x20 [ 3335.646523] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3335.652073] ? fput+0x128/0x1a0 [ 3335.655372] ? do_syscall_64+0x8c/0x800 [ 3335.659345] ? do_syscall_64+0x8c/0x800 [ 3335.663316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3335.668848] ? security_file_ioctl+0x93/0xc0 [ 3335.673265] ksys_ioctl+0xab/0xd0 [ 3335.676733] __x64_sys_ioctl+0x73/0xb0 [ 3335.680635] do_syscall_64+0x1a3/0x800 [ 3335.684531] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3335.689464] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3335.694474] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3335.699325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3335.704517] RIP: 0033:0x458099 [ 3335.707706] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3335.726595] RSP: 002b:00007fd857aeec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3335.734360] RAX: ffffffffffffffda RBX: 00007fd857aeec90 RCX: 0000000000458099 [ 3335.741638] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 10:42:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x7e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3335.748897] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3335.756188] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd857aef6d4 [ 3335.763449] R13: 00000000004c1016 R14: 00000000004d2c38 R15: 0000000000000006 10:42:28 executing program 3 (fault-call:7 fault-nth:7): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:42:28 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x82, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x0, [0x10a]}) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000100)=0x5000) [ 3335.975374] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:29 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x83, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3336.026102] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:29 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0x10, 0x4, 0x4, 0x8}, 0x2c) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x40000, 0x0) keyctl$set_timeout(0xf, r1, 0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) faccessat(r2, &(0x7f0000000000)='./file0\x00', 0x8, 0x0) 10:42:29 executing program 5: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x1264, 0x1) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000040)=0x5) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000080)=r1) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x101000, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x6, 0x105000) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000140)={@broadcast, @remote, 0x0}, &(0x7f0000000180)=0xc) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r4, @dev={0xac, 0x14, 0x14, 0x2b}, @rand_addr=0x1}, 0xc) get_thread_area(&(0x7f0000000240)={0x1, 0x0, 0x0, 0x54, 0x100000000, 0x4, 0x9, 0x0, 0x3ff, 0x800}) flistxattr(r2, &(0x7f0000000200)=""/9, 0x9) [ 3336.136337] FAULT_INJECTION: forcing a failure. [ 3336.136337] name failslab, interval 1, probability 0, space 0, times 0 [ 3336.222256] CPU: 0 PID: 19966 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #34 [ 3336.229491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3336.238892] Call Trace: [ 3336.241535] dump_stack+0x1db/0x2d0 [ 3336.245191] ? dump_stack_print_info.cold+0x20/0x20 [ 3336.250211] ? percpu_ref_put_many+0x129/0x270 [ 3336.254824] should_fail.cold+0xa/0x15 [ 3336.258722] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3336.263839] ? ___might_sleep+0x1e7/0x310 [ 3336.267990] ? arch_local_save_flags+0x50/0x50 [ 3336.272615] __should_failslab+0x121/0x190 [ 3336.276888] should_failslab+0x9/0x14 [ 3336.280690] kmem_cache_alloc+0x2be/0x710 [ 3336.284835] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3336.290374] ? kvm_is_reserved_pfn+0x144/0x1c0 [ 3336.294970] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3336.300529] mmu_topup_memory_caches+0x97/0x490 [ 3336.305202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3336.310742] kvm_mmu_load+0x21/0x1200 [ 3336.314570] ? kvm_apic_accept_pic_intr+0xef/0x1a0 [ 3336.319512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3336.325064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3336.330612] vcpu_enter_guest+0x3f0e/0x6520 [ 3336.334944] ? emulator_read_emulated+0x50/0x50 [ 3336.339628] ? add_lock_to_list.isra.0+0x450/0x450 [ 3336.344610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3336.350162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3336.355707] ? check_preemption_disabled+0x48/0x290 [ 3336.360738] ? __lock_is_held+0xb6/0x140 [ 3336.364845] ? lock_acquire+0x1db/0x570 [ 3336.368818] ? kvm_arch_vcpu_ioctl_run+0x240/0x16e0 [ 3336.373857] ? lock_release+0xc40/0xc40 [ 3336.377835] ? kvm_gen_update_masterclock+0x380/0x380 [ 3336.383030] ? rcu_sync_dtor+0x170/0x170 [ 3336.387103] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3336.391939] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3336.397013] kvm_vcpu_ioctl+0x558/0x12d0 [ 3336.401087] ? kvm_vcpu_block+0x1010/0x1010 [ 3336.405424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3336.410961] ? lock_downgrade+0x910/0x910 [ 3336.415105] ? kasan_check_read+0x11/0x20 [ 3336.419269] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3336.424560] ? rcu_read_unlock_special+0x380/0x380 [ 3336.429492] ? __fget+0x499/0x710 [ 3336.433071] ? iterate_fd+0x4b0/0x4b0 [ 3336.436906] ? kvm_vcpu_block+0x1010/0x1010 [ 3336.441223] do_vfs_ioctl+0x107b/0x17d0 [ 3336.445209] ? wait_for_completion+0x810/0x810 [ 3336.449789] ? ioctl_preallocate+0x2f0/0x2f0 [ 3336.454208] ? smack_inode_setattr+0x290/0x290 [ 3336.458788] ? __fget_light+0x2db/0x420 [ 3336.462758] ? fget_raw+0x20/0x20 [ 3336.466230] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3336.471765] ? fput+0x128/0x1a0 [ 3336.475075] ? do_syscall_64+0x8c/0x800 [ 3336.479058] ? do_syscall_64+0x8c/0x800 [ 3336.483069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3336.488609] ? security_file_ioctl+0x93/0xc0 [ 3336.493061] ksys_ioctl+0xab/0xd0 [ 3336.496662] __x64_sys_ioctl+0x73/0xb0 [ 3336.500586] do_syscall_64+0x1a3/0x800 [ 3336.504515] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3336.509448] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3336.514488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3336.519359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3336.524555] RIP: 0033:0x458099 [ 3336.527784] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3336.546698] RSP: 002b:00007fd857aeec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3336.554399] RAX: ffffffffffffffda RBX: 00007fd857aeec90 RCX: 0000000000458099 [ 3336.561682] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 10:42:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x20000004) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0xfd, "76d221bcd9dba0117f844ecfcee5530e88ddbe65aa989048b814d58204d5a032c4bb069e715280a0e952cc2e4fea54761e7b16ca3762f4a163abec068ac2e84e3eec9115be75540b45387abb135fbe79b19bf1f535b781d3683cb7e4a94a019bcab549e2ac357c907b9c6f8593385e3159c03124d5c4037cd21808380bf650ae3a1b7cf4e977d503555ba14984e1db05dea699538eec9d6c090be16a5ae291b27ce07802517d524dbdf861dbda43f17c7d1fb7ec16a56c09eb1d9f70dd3348cd9a94e25d0a9a0f5fd9422f6e516e6ab62aa45efe5abeb52888eb777f7653b2f6780d0ee7a0c705c692e61984093fa6e46fd9c1a4308e21cebde5d03015"}, &(0x7f00000003c0)=0x105) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000400)=@assoc_id=r1, 0x4) ioctl$FS_IOC_GETFLAGS(r0, 0x801c581f, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', r2}) 10:42:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) ioctl$TIOCCBRK(r0, 0x5428) ioctl$TCFLSH(r1, 0x5437, 0x0) [ 3336.568945] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3336.576218] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd857aef6d4 [ 3336.583479] R13: 00000000004c1016 R14: 00000000004d2c38 R15: 0000000000000006 [ 3336.623774] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:29 executing program 3 (fault-call:7 fault-nth:8): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:42:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x2) ioctl(r0, 0x41000008912, &(0x7f0000000200)="0adc1f023c123f3188a070") syz_emit_ethernet(0x300600, &(0x7f0000000000)={@local, @empty=[0x6000000088caffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300027, 0x2b, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 10:42:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x397881, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x50f, &(0x7f0000000080)={@local, @random="5966b3a1082f", [], {@ipv6={0x86dd, {0x0, 0x6, "a1bba9", 0x4d9, 0x2c, 0x0, @local={0xfe, 0x80, [0xa00000000000000]}, @local, {[], @gre={{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [], "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"}, {}, {}, {0x8, 0x6558, 0x0, "2e7c1df3f2f4acbb4ace6e8a50565b595591e78d9b12245a598496ea23d4c406af9f3b4a3f009159f9ac1555e4477ff94d4d50913843082ace4419eb0e79f826c9d383e2310e60b0b49f7a2d305f00945c1f774a8da5fb8f04988ee9e082d4f9070955ff1bbd44d6fdb144e01f9f2e5ee65ccc71338ca0a50652cb6b5ae30e0fce110b555945fa43cebd22a399d6a33dea3af82460a33f5a491976018b1b56dd512d481061c6bb980d69bccee5352b18539b08b6ac9e0116f524316e8c9c036ecc70932caf6f67e8cd867f37c25ce2cc300f9b13e48dbe"}}}}}}}, 0x0) 10:42:29 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x84, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:29 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3336.776468] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:29 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x87, 0x3f, 0x8, 0x6, 0xce, 0x800, 0x6446, 0x3}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) close(0xffffffffffffffff) syz_open_dev$loop(0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r3, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r4, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="18ea0b171e7ecc00a2b637ff8d7f8b3c550300009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r4, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) r8 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f00000019c0)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x100000001, 'syz0\x00', @bcast, 0x9, 0x1, [@default, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}) ftruncate(r8, 0x400002f) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) close(r6) close(r7) 10:42:29 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x85, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:29 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3336.958533] FAULT_INJECTION: forcing a failure. [ 3336.958533] name failslab, interval 1, probability 0, space 0, times 0 10:42:30 executing program 1: r0 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) getgroups(0x4, &(0x7f0000000400)=[0xee00, 0x0, 0xee00, 0xffffffffffffffff]) lstat(&(0x7f0000000440)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r6, 0xc0585609, &(0x7f0000000700)={0x80, 0x7, 0x4, 0x100, {0x77359400}, {0x5, 0x1, 0x5, 0x5, 0x4, 0x0, "05307b5c"}, 0x7, 0x4, @userptr=0xb402, 0x4}) stat(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() lstat(&(0x7f0000000940)='./bus\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x6}, [{0x2, 0x0, r0}, {0x2, 0x1, r1}], {0x4, 0x2}, [{0x8, 0x1, r2}, {0x8, 0x4, r3}, {0x8, 0x2, r4}, {0x8, 0x0, r5}, {0x8, 0x2, r7}, {0x8, 0x3, r8}, {0x8, 0x4, r9}, {0x8, 0x1, r10}, {0x8, 0x2, r11}], {0x10, 0x4}}, 0x7c, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = creat(&(0x7f0000000080)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x60) truncate(&(0x7f00000000c0)='./bus\x00', 0x1000) r13 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000800)={0x0}, &(0x7f0000000840)=0xc) migrate_pages(r14, 0x81, &(0x7f0000000880)=0x400, &(0x7f0000000980)=0x6) lseek(r12, 0x0, 0x2) sendfile(r12, r13, 0x0, 0x40000) [ 3337.019643] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 3337.053239] CPU: 0 PID: 20019 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #34 [ 3337.060471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3337.069821] Call Trace: [ 3337.072434] dump_stack+0x1db/0x2d0 [ 3337.076085] ? dump_stack_print_info.cold+0x20/0x20 [ 3337.081199] ? percpu_ref_put_many+0x129/0x270 [ 3337.085801] should_fail.cold+0xa/0x15 [ 3337.089719] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3337.094833] ? ___might_sleep+0x1e7/0x310 [ 3337.098992] ? arch_local_save_flags+0x50/0x50 [ 3337.103597] __should_failslab+0x121/0x190 [ 3337.107844] should_failslab+0x9/0x14 [ 3337.111655] kmem_cache_alloc+0x2be/0x710 [ 3337.115810] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3337.121353] ? kvm_is_reserved_pfn+0x144/0x1c0 [ 3337.125943] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3337.131520] mmu_topup_memory_caches+0x97/0x490 [ 3337.136236] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3337.141787] kvm_mmu_load+0x21/0x1200 [ 3337.145613] ? kvm_apic_accept_pic_intr+0xef/0x1a0 [ 3337.150551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3337.156095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3337.161672] vcpu_enter_guest+0x3f0e/0x6520 [ 3337.166012] ? emulator_read_emulated+0x50/0x50 [ 3337.170699] ? add_lock_to_list.isra.0+0x450/0x450 [ 3337.175633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3337.181167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3337.186702] ? check_preemption_disabled+0x48/0x290 [ 3337.191738] ? __lock_is_held+0xb6/0x140 [ 3337.195825] ? lock_acquire+0x1db/0x570 [ 3337.199824] ? kvm_arch_vcpu_ioctl_run+0x240/0x16e0 [ 3337.204873] ? lock_release+0xc40/0xc40 [ 3337.208848] ? kvm_gen_update_masterclock+0x380/0x380 [ 3337.214051] ? rcu_sync_dtor+0x170/0x170 [ 3337.218141] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3337.222996] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3337.228035] kvm_vcpu_ioctl+0x558/0x12d0 [ 3337.232101] ? kvm_vcpu_block+0x1010/0x1010 [ 3337.236420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3337.241975] ? lock_downgrade+0x910/0x910 [ 3337.246136] ? kasan_check_read+0x11/0x20 [ 3337.250328] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3337.255617] ? rcu_read_unlock_special+0x380/0x380 [ 3337.260590] ? __fget+0x499/0x710 [ 3337.264065] ? iterate_fd+0x4b0/0x4b0 [ 3337.267871] ? kvm_vcpu_block+0x1010/0x1010 [ 3337.272196] do_vfs_ioctl+0x107b/0x17d0 [ 3337.276175] ? wait_for_completion+0x810/0x810 [ 3337.280763] ? ioctl_preallocate+0x2f0/0x2f0 [ 3337.285175] ? smack_inode_setattr+0x290/0x290 [ 3337.289763] ? __fget_light+0x2db/0x420 [ 3337.293744] ? fget_raw+0x20/0x20 [ 3337.297202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3337.302744] ? fput+0x128/0x1a0 [ 3337.306081] ? do_syscall_64+0x8c/0x800 [ 3337.310062] ? do_syscall_64+0x8c/0x800 [ 3337.314049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3337.319638] ? security_file_ioctl+0x93/0xc0 [ 3337.324078] ksys_ioctl+0xab/0xd0 [ 3337.327541] __x64_sys_ioctl+0x73/0xb0 [ 3337.331434] do_syscall_64+0x1a3/0x800 [ 3337.335333] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3337.340270] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3337.345309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3337.350160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3337.355356] RIP: 0033:0x458099 10:42:30 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x86, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3337.358588] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3337.377518] RSP: 002b:00007fd857aeec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3337.385218] RAX: ffffffffffffffda RBX: 00007fd857aeec90 RCX: 0000000000458099 [ 3337.392479] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 3337.399754] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3337.407014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd857aef6d4 [ 3337.414286] R13: 00000000004c1016 R14: 00000000004d2c38 R15: 0000000000000006 [ 3337.423424] audit: type=1804 audit(1547980950.087:869): pid=20038 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir807698405/syzkaller.aKGlET/458/bus" dev="sda1" ino=17873 res=1 [ 3337.476678] audit: type=1804 audit(1547980950.087:870): pid=20037 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir807698405/syzkaller.aKGlET/458/bus" dev="sda1" ino=17873 res=1 [ 3337.499721] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3337.510378] audit: type=1804 audit(1547980950.547:871): pid=20038 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir807698405/syzkaller.aKGlET/458/bus" dev="sda1" ino=17873 res=1 [ 3337.539212] audit: type=1804 audit(1547980950.577:872): pid=20046 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir807698405/syzkaller.aKGlET/458/bus" dev="sda1" ino=17873 res=1 [ 3337.585870] audit: type=1804 audit(1547980950.577:873): pid=20037 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir807698405/syzkaller.aKGlET/458/bus" dev="sda1" ino=17873 res=1 10:42:30 executing program 3 (fault-call:7 fault-nth:9): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:42:30 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x87, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:30 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:30 executing program 1: r0 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) getgroups(0x4, &(0x7f0000000400)=[0xee00, 0x0, 0xee00, 0xffffffffffffffff]) lstat(&(0x7f0000000440)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r6, 0xc0585609, &(0x7f0000000700)={0x80, 0x7, 0x4, 0x100, {0x77359400}, {0x5, 0x1, 0x5, 0x5, 0x4, 0x0, "05307b5c"}, 0x7, 0x4, @userptr=0xb402, 0x4}) stat(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() lstat(&(0x7f0000000940)='./bus\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0x6}, [{0x2, 0x0, r0}, {0x2, 0x1, r1}], {0x4, 0x2}, [{0x8, 0x1, r2}, {0x8, 0x4, r3}, {0x8, 0x2, r4}, {0x8, 0x0, r5}, {0x8, 0x2, r7}, {0x8, 0x3, r8}, {0x8, 0x4, r9}, {0x8, 0x1, r10}, {0x8, 0x2, r11}], {0x10, 0x4}}, 0x7c, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = creat(&(0x7f0000000080)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x60) truncate(&(0x7f00000000c0)='./bus\x00', 0x1000) r13 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000800)={0x0}, &(0x7f0000000840)=0xc) migrate_pages(r14, 0x81, &(0x7f0000000880)=0x400, &(0x7f0000000980)=0x6) lseek(r12, 0x0, 0x2) sendfile(r12, r13, 0x0, 0x40000) 10:42:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3337.755270] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3337.812257] FAULT_INJECTION: forcing a failure. [ 3337.812257] name failslab, interval 1, probability 0, space 0, times 0 [ 3337.869108] CPU: 0 PID: 20060 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #34 [ 3337.876309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3337.885669] Call Trace: [ 3337.888302] dump_stack+0x1db/0x2d0 [ 3337.891936] ? dump_stack_print_info.cold+0x20/0x20 [ 3337.896951] ? percpu_ref_put_many+0x129/0x270 [ 3337.901563] should_fail.cold+0xa/0x15 [ 3337.905454] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3337.910566] ? ___might_sleep+0x1e7/0x310 [ 3337.914720] ? arch_local_save_flags+0x50/0x50 [ 3337.919320] __should_failslab+0x121/0x190 [ 3337.923558] should_failslab+0x9/0x14 [ 3337.927379] kmem_cache_alloc+0x2be/0x710 [ 3337.927396] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3337.927414] ? kvm_is_reserved_pfn+0x144/0x1c0 [ 3337.927434] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3337.947202] mmu_topup_memory_caches+0x97/0x490 [ 3337.951874] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3337.957420] kvm_mmu_load+0x21/0x1200 [ 3337.961228] ? kvm_apic_accept_pic_intr+0xef/0x1a0 [ 3337.966164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3337.971707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3337.977252] vcpu_enter_guest+0x3f0e/0x6520 [ 3337.981597] ? emulator_read_emulated+0x50/0x50 [ 3337.986266] ? add_lock_to_list.isra.0+0x450/0x450 [ 3337.991202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3337.996756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3338.002317] ? check_preemption_disabled+0x48/0x290 [ 3338.007339] ? __lock_is_held+0xb6/0x140 [ 3338.011404] ? lock_acquire+0x1db/0x570 [ 3338.015411] ? kvm_arch_vcpu_ioctl_run+0x240/0x16e0 [ 3338.020445] ? lock_release+0xc40/0xc40 [ 3338.024421] ? kvm_gen_update_masterclock+0x380/0x380 [ 3338.029629] ? rcu_sync_dtor+0x170/0x170 [ 3338.033696] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3338.038539] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3338.043593] kvm_vcpu_ioctl+0x558/0x12d0 [ 3338.047679] ? kvm_vcpu_block+0x1010/0x1010 [ 3338.052035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3338.057593] ? lock_downgrade+0x910/0x910 [ 3338.061740] ? kasan_check_read+0x11/0x20 [ 3338.065890] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3338.071174] ? rcu_read_unlock_special+0x380/0x380 [ 3338.076119] ? __fget+0x499/0x710 [ 3338.079582] ? iterate_fd+0x4b0/0x4b0 [ 3338.083392] ? kvm_vcpu_block+0x1010/0x1010 [ 3338.087717] do_vfs_ioctl+0x107b/0x17d0 [ 3338.091698] ? wait_for_completion+0x810/0x810 [ 3338.096288] ? ioctl_preallocate+0x2f0/0x2f0 [ 3338.100709] ? smack_inode_setattr+0x290/0x290 [ 3338.105296] ? __fget_light+0x2db/0x420 [ 3338.109287] ? fget_raw+0x20/0x20 [ 3338.112752] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3338.118304] ? fput+0x128/0x1a0 [ 3338.121591] ? do_syscall_64+0x8c/0x800 [ 3338.125574] ? do_syscall_64+0x8c/0x800 [ 3338.129666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3338.135205] ? security_file_ioctl+0x93/0xc0 [ 3338.135225] ksys_ioctl+0xab/0xd0 [ 3338.135243] __x64_sys_ioctl+0x73/0xb0 [ 3338.135260] do_syscall_64+0x1a3/0x800 [ 3338.150867] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3338.155801] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3338.160825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3338.165785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3338.170972] RIP: 0033:0x458099 [ 3338.174165] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3338.193129] RSP: 002b:00007fd857aeec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3338.200855] RAX: ffffffffffffffda RBX: 00007fd857aeec90 RCX: 0000000000458099 [ 3338.208122] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 10:42:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000ff00000000950000000000000000000000000000"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) 10:42:31 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x88, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:31 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:31 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0x7}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000100)=0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="50000000250028032cbd7000fedbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00000000530000000000e0ff0c0001007072696f000000001800020060040200a0474151e9ce31eefefcf48373c6a5a5ff1208000e000000"], 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x20000080) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 10:42:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3338.215385] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3338.222651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd857aef6d4 [ 3338.229917] R13: 00000000004c1016 R14: 00000000004d2c38 R15: 0000000000000006 [ 3338.237747] audit: type=1804 audit(1547980950.907:874): pid=20065 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir807698405/syzkaller.aKGlET/459/bus" dev="sda1" ino=17130 res=1 [ 3338.320504] audit: type=1804 audit(1547980950.907:875): pid=20070 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir807698405/syzkaller.aKGlET/459/bus" dev="sda1" ino=17130 res=1 10:42:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000001a80)=[&(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000001a40)}]) 10:42:31 executing program 3 (fault-call:7 fault-nth:10): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:42:31 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x89, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:31 executing program 1: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000440)="b156d417452c8f6db1077f2abaa85e348946610dabcc617d9aeb42aa515f23c9150bfdba5ea1be4e", 0x28) semget(0x0, 0x1, 0x80) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x420002, 0x0) read$alg(r2, &(0x7f0000000040)=""/13, 0xd) 10:42:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000280)=r2) r3 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000040)=0x7, 0x4) writev(r3, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff810040010000000058000b4824ca945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010003080800414900000004fcff", 0x58}], 0x1) r4 = gettid() perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x328, 0xfd, 0x7826, 0x1, 0x0, 0x6d, 0x4800, 0x0, 0x1, 0xab0b, 0x101, 0x0, 0x8, 0xfd, 0xffffffff, 0x40, 0x100000001, 0x187, 0x101, 0x7, 0x3f, 0x80000000, 0x600, 0x4, 0x3ff, 0x6, 0x2, 0xff, 0x7fffffff, 0x5, 0x9, 0x0, 0xffff, 0x33da, 0x200, 0x647e, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0), 0x7}, 0x10500, 0x2, 0x0, 0x0, 0x1, 0xfffffffffffffffc, 0x9}, r4, 0x4, r2, 0x2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000100)=0x585) 10:42:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:31 executing program 1: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000440)="b156d417452c8f6db1077f2abaa85e348946610dabcc617d9aeb42aa515f23c9150bfdba5ea1be4e", 0x28) semget(0x0, 0x1, 0x80) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x420002, 0x0) read$alg(r2, &(0x7f0000000040)=""/13, 0xd) 10:42:31 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3338.809867] FAULT_INJECTION: forcing a failure. [ 3338.809867] name failslab, interval 1, probability 0, space 0, times 0 [ 3338.930924] CPU: 1 PID: 20104 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #34 [ 3338.938146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3338.947498] Call Trace: [ 3338.950106] dump_stack+0x1db/0x2d0 [ 3338.953756] ? dump_stack_print_info.cold+0x20/0x20 [ 3338.958780] ? percpu_ref_put_many+0x129/0x270 [ 3338.963404] should_fail.cold+0xa/0x15 [ 3338.967312] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3338.972454] ? ___might_sleep+0x1e7/0x310 [ 3338.976603] ? arch_local_save_flags+0x50/0x50 [ 3338.981207] __should_failslab+0x121/0x190 [ 3338.985446] should_failslab+0x9/0x14 [ 3338.989256] kmem_cache_alloc+0x2be/0x710 [ 3338.993400] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3338.998947] ? kvm_is_reserved_pfn+0x144/0x1c0 [ 3339.003531] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3339.009087] mmu_topup_memory_caches+0x97/0x490 [ 3339.013751] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3339.019285] kvm_mmu_load+0x21/0x1200 [ 3339.023083] ? kvm_apic_accept_pic_intr+0xef/0x1a0 [ 3339.028005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.033541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.039106] vcpu_enter_guest+0x3f0e/0x6520 [ 3339.043434] ? emulator_read_emulated+0x50/0x50 [ 3339.048094] ? add_lock_to_list.isra.0+0x450/0x450 [ 3339.053024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.058556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.064087] ? check_preemption_disabled+0x48/0x290 [ 3339.069111] ? __lock_is_held+0xb6/0x140 [ 3339.073169] ? lock_acquire+0x1db/0x570 [ 3339.077142] ? kvm_arch_vcpu_ioctl_run+0x240/0x16e0 [ 3339.082157] ? lock_release+0xc40/0xc40 [ 3339.086128] ? kvm_gen_update_masterclock+0x380/0x380 [ 3339.091329] ? rcu_sync_dtor+0x170/0x170 [ 3339.095391] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3339.100228] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3339.105250] kvm_vcpu_ioctl+0x558/0x12d0 [ 3339.109308] ? kvm_vcpu_block+0x1010/0x1010 [ 3339.113629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.119164] ? lock_downgrade+0x910/0x910 [ 3339.123322] ? kasan_check_read+0x11/0x20 [ 3339.127466] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3339.132742] ? rcu_read_unlock_special+0x380/0x380 [ 3339.137676] ? __fget+0x499/0x710 [ 3339.141133] ? iterate_fd+0x4b0/0x4b0 [ 3339.144936] ? kvm_vcpu_block+0x1010/0x1010 [ 3339.149259] do_vfs_ioctl+0x107b/0x17d0 [ 3339.153231] ? wait_for_completion+0x810/0x810 [ 3339.157817] ? ioctl_preallocate+0x2f0/0x2f0 [ 3339.162227] ? smack_inode_setattr+0x290/0x290 [ 3339.166808] ? __fget_light+0x2db/0x420 [ 3339.170778] ? fget_raw+0x20/0x20 [ 3339.174245] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3339.179775] ? fput+0x128/0x1a0 [ 3339.183066] ? do_syscall_64+0x8c/0x800 [ 3339.187055] ? do_syscall_64+0x8c/0x800 [ 3339.191056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.196596] ? security_file_ioctl+0x93/0xc0 [ 3339.201068] ksys_ioctl+0xab/0xd0 [ 3339.204534] __x64_sys_ioctl+0x73/0xb0 [ 3339.208418] do_syscall_64+0x1a3/0x800 [ 3339.212303] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3339.217230] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3339.222242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3339.227082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3339.232263] RIP: 0033:0x458099 [ 3339.235488] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3339.254394] RSP: 002b:00007fd857aeec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3339.262109] RAX: ffffffffffffffda RBX: 00007fd857aeec90 RCX: 0000000000458099 [ 3339.269384] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 3339.276694] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3339.284011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd857aef6d4 [ 3339.291359] R13: 00000000004c1016 R14: 00000000004d2c38 R15: 0000000000000006 10:42:32 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:32 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x401, {}, 0x20000000, 0xffffffff00000001}, 0xe) listen(r0, 0x3) 10:42:32 executing program 3 (fault-call:7 fault-nth:11): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:42:32 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:32 executing program 1: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080044dfb, &(0x7f0000000080)) 10:42:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r1, 0x0, 0x1, &(0x7f0000000100)=0xfffffffffffffffd, 0x4) 10:42:32 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3339.635534] FAULT_INJECTION: forcing a failure. [ 3339.635534] name failslab, interval 1, probability 0, space 0, times 0 10:42:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0xfffffb, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000080)="0adc1f023cdd3365465014") unshare(0x2000400) ioctl$FS_IOC_FSGETXATTR(r2, 0x551f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f00000001c0)) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) recvfrom$unix(r4, &(0x7f0000000240)=""/148, 0x94, 0x61, 0x0, 0x0) r5 = eventfd(0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000180)='/dev/kvm\x00', 0x9, 0x1) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f00000000c0)={r5}) ioctl$NBD_SET_SOCK(r4, 0xab00, r4) write$eventfd(r5, &(0x7f0000000100), 0xfffffe1b) [ 3339.779615] CPU: 1 PID: 20138 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #34 [ 3339.786864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3339.796215] Call Trace: [ 3339.798819] dump_stack+0x1db/0x2d0 [ 3339.802464] ? dump_stack_print_info.cold+0x20/0x20 [ 3339.807481] ? percpu_ref_put_many+0x129/0x270 [ 3339.812075] should_fail.cold+0xa/0x15 [ 3339.815996] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3339.821126] ? ___might_sleep+0x1e7/0x310 [ 3339.825298] ? arch_local_save_flags+0x50/0x50 [ 3339.829893] __should_failslab+0x121/0x190 [ 3339.834135] should_failslab+0x9/0x14 [ 3339.838171] kmem_cache_alloc+0x2be/0x710 [ 3339.842339] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3339.847874] ? kvm_is_reserved_pfn+0x144/0x1c0 [ 3339.847888] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3339.847908] mmu_topup_memory_caches+0x97/0x490 [ 3339.847920] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3339.847936] kvm_mmu_load+0x21/0x1200 [ 3339.847948] ? kvm_apic_accept_pic_intr+0xef/0x1a0 [ 3339.847974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.847986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.848004] vcpu_enter_guest+0x3f0e/0x6520 [ 3339.848033] ? emulator_read_emulated+0x50/0x50 [ 3339.897075] ? add_lock_to_list.isra.0+0x450/0x450 [ 3339.902004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.907562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.913136] ? check_preemption_disabled+0x48/0x290 [ 3339.918198] ? __lock_is_held+0xb6/0x140 [ 3339.922727] ? lock_acquire+0x1db/0x570 [ 3339.926708] ? kvm_arch_vcpu_ioctl_run+0x240/0x16e0 [ 3339.931729] ? lock_release+0xc40/0xc40 [ 3339.935702] ? kvm_gen_update_masterclock+0x380/0x380 [ 3339.940895] ? rcu_sync_dtor+0x170/0x170 [ 3339.944976] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3339.949825] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3339.954853] kvm_vcpu_ioctl+0x558/0x12d0 [ 3339.958918] ? kvm_vcpu_block+0x1010/0x1010 [ 3339.963246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.968812] ? lock_downgrade+0x910/0x910 [ 3339.972962] ? kasan_check_read+0x11/0x20 10:42:32 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:33 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3339.977111] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3339.982417] ? rcu_read_unlock_special+0x380/0x380 [ 3339.987351] ? __fget+0x499/0x710 [ 3339.987371] ? iterate_fd+0x4b0/0x4b0 [ 3339.987389] ? kvm_vcpu_block+0x1010/0x1010 [ 3339.987403] do_vfs_ioctl+0x107b/0x17d0 [ 3339.987419] ? wait_for_completion+0x810/0x810 [ 3339.987435] ? ioctl_preallocate+0x2f0/0x2f0 [ 3339.987449] ? smack_inode_setattr+0x290/0x290 [ 3339.987461] ? __fget_light+0x2db/0x420 [ 3339.987475] ? fget_raw+0x20/0x20 [ 3339.987490] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3339.987505] ? fput+0x128/0x1a0 [ 3339.987520] ? do_syscall_64+0x8c/0x800 [ 3339.994746] ? do_syscall_64+0x8c/0x800 [ 3339.994763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3339.994779] ? security_file_ioctl+0x93/0xc0 [ 3339.994802] ksys_ioctl+0xab/0xd0 [ 3339.994819] __x64_sys_ioctl+0x73/0xb0 [ 3339.994834] do_syscall_64+0x1a3/0x800 [ 3339.994850] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3339.994865] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3339.994882] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3340.076677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3340.081862] RIP: 0033:0x458099 [ 3340.085056] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3340.103976] RSP: 002b:00007fd857aeec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3340.111677] RAX: ffffffffffffffda RBX: 00007fd857aeec90 RCX: 0000000000458099 [ 3340.118935] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 3340.126193] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3340.133466] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd857aef6d4 [ 3340.140744] R13: 00000000004c1016 R14: 00000000004d2c38 R15: 0000000000000006 [ 3340.171477] IPVS: ftp: loaded support on port[0] = 21 [ 3340.406046] chnl_net:caif_netlink_parms(): no params data found [ 3340.452123] bridge0: port 1(bridge_slave_0) entered blocking state [ 3340.460051] bridge0: port 1(bridge_slave_0) entered disabled state [ 3340.467909] device bridge_slave_0 entered promiscuous mode [ 3340.475219] bridge0: port 2(bridge_slave_1) entered blocking state [ 3340.475328] bridge0: port 2(bridge_slave_1) entered disabled state [ 3340.489186] device bridge_slave_1 entered promiscuous mode [ 3340.512462] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3340.522067] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3340.538904] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3340.546610] team0: Port device team_slave_0 added [ 3340.556428] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3340.563578] team0: Port device team_slave_1 added [ 3340.569143] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3340.576686] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3340.627542] device hsr_slave_0 entered promiscuous mode [ 3340.664480] device hsr_slave_1 entered promiscuous mode [ 3340.734925] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3340.741861] device bridge_slave_1 left promiscuous mode [ 3340.748418] bridge0: port 2(bridge_slave_1) entered disabled state [ 3340.805242] device bridge_slave_0 left promiscuous mode [ 3340.810778] bridge0: port 1(bridge_slave_0) entered disabled state [ 3340.958195] device hsr_slave_1 left promiscuous mode [ 3341.010855] device hsr_slave_0 left promiscuous mode [ 3341.069573] team0 (unregistering): Port device team_slave_1 removed [ 3341.080586] team0 (unregistering): Port device team_slave_0 removed [ 3341.091553] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3341.131986] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3341.235178] bond0 (unregistering): Released all slaves [ 3341.309960] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3341.322680] bridge0: port 2(bridge_slave_1) entered blocking state [ 3341.329063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3341.335717] bridge0: port 1(bridge_slave_0) entered blocking state [ 3341.342056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3341.377633] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 3341.383706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3341.392570] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3341.402632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3341.410756] bridge0: port 1(bridge_slave_0) entered disabled state [ 3341.418111] bridge0: port 2(bridge_slave_1) entered disabled state [ 3341.427123] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3341.439172] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3341.446171] 8021q: adding VLAN 0 to HW filter on device team0 [ 3341.457850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3341.466988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3341.475419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3341.483103] bridge0: port 1(bridge_slave_0) entered blocking state [ 3341.489487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3341.499229] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3341.506652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3341.515521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3341.523081] bridge0: port 2(bridge_slave_1) entered blocking state [ 3341.529476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3341.539178] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3341.546529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3341.557309] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3341.565760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3341.567927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3341.580950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3341.589221] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3341.597767] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3341.607818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3341.616098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3341.616761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3341.633615] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3341.641119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3341.648670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3341.710267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3341.721063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3341.732246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3341.749506] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3341.759824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3341.787817] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3341.807916] 8021q: adding VLAN 0 to HW filter on device batadv0 10:42:35 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:35 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp512\x00'}, 0x58) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000005c0)="9c", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000002c0)={r1, r1, r0}, &(0x7f0000000200)=""/83, 0x37, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006700)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000780)=[{&(0x7f00000000c0)=""/184, 0xb8}, {&(0x7f0000000300)=""/62, 0x3e}, {&(0x7f0000000480)=""/200, 0xc8}, {&(0x7f0000000340)=""/55, 0x37}, {&(0x7f0000000380)}, {&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/135, 0x87}], 0x7, &(0x7f0000000800)=""/139, 0x8b}, 0xfffffffeffffffff}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f00000008c0)=""/125, 0x7d}, {&(0x7f0000000940)=""/201, 0xc9}, {&(0x7f0000000a40)=""/201, 0xc9}, {&(0x7f0000000b40)=""/236, 0xec}, {&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000c40)=""/76, 0x4c}, {&(0x7f0000000580)=""/10, 0xa}, {&(0x7f0000000cc0)=""/183, 0xb7}, {&(0x7f0000000d80)=""/4096, 0x1000}], 0x9, &(0x7f0000001e40)=""/76, 0x4c}, 0x4eda}, {{&(0x7f0000001ec0)=@generic, 0x80, &(0x7f00000034c0)=[{&(0x7f0000001f40)=""/17, 0x11}, {&(0x7f0000001f80)=""/130, 0x82}, {&(0x7f0000002040)=""/119, 0x77}, {&(0x7f00000020c0)=""/182, 0xb6}, {&(0x7f0000002180)=""/197, 0xc5}, {&(0x7f0000002280)=""/236, 0xec}, {&(0x7f0000002380)=""/46, 0x2e}, {&(0x7f00000023c0)=""/146, 0x92}, {&(0x7f0000002480)=""/4096, 0x1000}, {&(0x7f0000003480)=""/7, 0x7}], 0xa}, 0x7ff}, {{&(0x7f0000003580)=@alg, 0x80, &(0x7f0000003600), 0x0, &(0x7f0000003640)=""/64, 0x40}, 0x55}, {{&(0x7f0000003680)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/132, 0x84}], 0x1, &(0x7f0000003800)=""/254, 0xfe}, 0x6}, {{&(0x7f0000003900)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000004ec0)=[{&(0x7f0000003980)=""/61, 0x3d}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f00000049c0)=""/132, 0x84}, {&(0x7f0000004a80)=""/216, 0xd8}, {&(0x7f0000004b80)=""/135, 0x87}, {&(0x7f0000004c40)=""/203, 0xcb}, {&(0x7f0000004d40)=""/113, 0x71}, {&(0x7f0000004dc0)=""/36, 0x24}, {&(0x7f0000004e00)=""/182, 0xb6}], 0x9, &(0x7f0000004f80)=""/126, 0x7e}, 0x1}, {{&(0x7f0000005000)=@caif=@dgm, 0x80, &(0x7f00000063c0)=[{&(0x7f0000005080)=""/251, 0xfb}, {&(0x7f0000005180)=""/248, 0xf8}, {&(0x7f0000005280)=""/4096, 0x1000}, {&(0x7f0000006280)=""/133, 0x85}, {&(0x7f0000006340)=""/24, 0x18}, {&(0x7f0000006380)=""/21, 0x15}], 0x6, &(0x7f0000006440)=""/184, 0xb8}, 0x4}, {{&(0x7f0000006500)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000006680)=[{&(0x7f0000006580)=""/105, 0x69}, {&(0x7f0000006600)=""/80, 0x50}], 0x2, &(0x7f00000066c0)=""/39, 0x27}, 0x1}], 0x8, 0x20, &(0x7f0000006900)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000069c0)={0x0, 0x80, &(0x7f0000006940)=[@in6={0xa, 0x4e20, 0xffff, @ipv4={[], [], @remote}, 0x3}, @in6={0xa, 0x4e22, 0xfac2, @ipv4={[], [], @broadcast}, 0xa7bc}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e24, 0x9, @mcast2}, @in6={0xa, 0x4e23, 0x5, @rand_addr="9bf29d50c6c3a72217f7bb8ab141048f", 0xd4}]}, &(0x7f0000006a00)=0x10) r4 = dup(r2) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000380)=@assoc_id=r3, &(0x7f0000003600)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000006a40)={r3, 0x1e}, 0x8) 10:42:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) rt_sigtimedwait(&(0x7f0000000100)={0x8}, &(0x7f0000000140), &(0x7f00000001c0)={0x0, 0x989680}, 0x8) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x38, 0x10, 0xf0b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@IFLA_GRE_LOCAL={0x8, 0x3, @rand_addr=0x3f000000}]}}}]}, 0x38}}, 0x0) 10:42:35 executing program 3 (fault-call:7 fault-nth:12): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 3341.952561] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3342.029335] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 3342.097273] FAULT_INJECTION: forcing a failure. [ 3342.097273] name failslab, interval 1, probability 0, space 0, times 0 [ 3342.098546] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 3342.125522] CPU: 1 PID: 20193 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #34 [ 3342.132717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3342.142152] Call Trace: 10:42:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x90, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3342.144753] dump_stack+0x1db/0x2d0 [ 3342.148383] ? dump_stack_print_info.cold+0x20/0x20 [ 3342.153425] ? percpu_ref_put_many+0x129/0x270 [ 3342.158012] should_fail.cold+0xa/0x15 [ 3342.161910] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3342.167045] ? ___might_sleep+0x1e7/0x310 [ 3342.167061] ? arch_local_save_flags+0x50/0x50 [ 3342.167117] __should_failslab+0x121/0x190 [ 3342.167165] should_failslab+0x9/0x14 [ 3342.167179] kmem_cache_alloc+0x2be/0x710 [ 3342.167192] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 10:42:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3342.167208] ? kvm_is_reserved_pfn+0x144/0x1c0 [ 3342.167222] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3342.175955] mmu_topup_memory_caches+0x97/0x490 [ 3342.175983] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3342.176000] kvm_mmu_load+0x21/0x1200 [ 3342.176036] ? kvm_apic_accept_pic_intr+0xef/0x1a0 [ 3342.176051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3342.176066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3342.176100] vcpu_enter_guest+0x3f0e/0x6520 [ 3342.176123] ? emulator_read_emulated+0x50/0x50 [ 3342.242816] ? add_lock_to_list.isra.0+0x450/0x450 [ 3342.247753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3342.253289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3342.258827] ? check_preemption_disabled+0x48/0x290 [ 3342.258848] ? __lock_is_held+0xb6/0x140 [ 3342.258865] ? lock_acquire+0x1db/0x570 [ 3342.258879] ? kvm_arch_vcpu_ioctl_run+0x240/0x16e0 [ 3342.258897] ? lock_release+0xc40/0xc40 [ 3342.258912] ? kvm_gen_update_masterclock+0x380/0x380 [ 3342.258927] ? rcu_sync_dtor+0x170/0x170 [ 3342.290179] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 10:42:35 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00007d9fc8)={&(0x7f000087fff4), 0xc, &(0x7f0000a40000)={&(0x7f0000b9e000)=@migrate={0xe4, 0x21, 0x411, 0x0, 0x0, {{@in=@multicast1, @in6=@mcast1}}, [@user_kmaddress={0x2c, 0x13, {@in=@multicast1, @in6=@ipv4}}, @migrate={0x5c, 0x11, [{@in6=@loopback, @in=@multicast2}, {@in6=@mcast1, @in6=@mcast1}]}, @policy_type={0xc, 0x10, {0xffffffffffffffff}}]}, 0xe4}}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfffffffffffffffe, 0x2000) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0xf6) [ 3342.295106] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3342.300146] kvm_vcpu_ioctl+0x558/0x12d0 [ 3342.304232] ? kvm_vcpu_block+0x1010/0x1010 [ 3342.308563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3342.314109] ? lock_downgrade+0x910/0x910 [ 3342.318261] ? kasan_check_read+0x11/0x20 [ 3342.322411] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3342.327690] ? rcu_read_unlock_special+0x380/0x380 [ 3342.332631] ? __fget+0x499/0x710 [ 3342.336093] ? iterate_fd+0x4b0/0x4b0 [ 3342.339893] ? kvm_vcpu_block+0x1010/0x1010 [ 3342.344235] do_vfs_ioctl+0x107b/0x17d0 [ 3342.348244] ? wait_for_completion+0x810/0x810 [ 3342.348263] ? ioctl_preallocate+0x2f0/0x2f0 [ 3342.348279] ? smack_inode_setattr+0x290/0x290 [ 3342.348313] ? __fget_light+0x2db/0x420 [ 3342.357281] ? fget_raw+0x20/0x20 [ 3342.357296] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3342.357309] ? fput+0x128/0x1a0 [ 3342.357323] ? do_syscall_64+0x8c/0x800 [ 3342.357335] ? do_syscall_64+0x8c/0x800 [ 3342.357350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3342.357366] ? security_file_ioctl+0x93/0xc0 10:42:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x91, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3342.357384] ksys_ioctl+0xab/0xd0 [ 3342.399542] __x64_sys_ioctl+0x73/0xb0 [ 3342.403440] do_syscall_64+0x1a3/0x800 [ 3342.407347] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3342.412299] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3342.417341] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3342.422212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3342.427458] RIP: 0033:0x458099 [ 3342.430659] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3342.445329] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3342.449600] RSP: 002b:00007fd857aeec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3342.449613] RAX: ffffffffffffffda RBX: 00007fd857aeec90 RCX: 0000000000458099 [ 3342.449620] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 3342.449628] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3342.449638] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd857aef6d4 10:42:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x7b, 0x1) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x27c) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000600)) sendmmsg(r0, &(0x7f0000009780)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000e40)="5b2482f5ee117288f3ccb4804568541d2339c8ff6cf798bdd13a50c813a949f7fb55479b9dd00ccfeec21b73b68d0449c95043d8b170a7f15b0461e51f41f04801726ede79944925509bbdfee012e3a3af1cde5e82a47bc1d8195848bff1f8e4c384e811839593b13026a4519d55ad9e324abee3271dc1ddf5d9ea133fd4b7a3e88747534c6d0b5d65b4bfdfa8888245fa66604af89ec1fe098a59ad5ba544121cf8ff4e3a75d74145f0b677a1ac03f3971f363d6fb7d847ada3dcfc8b0c7fa3", 0xc0}], 0x1}}], 0x1, 0x0) [ 3342.494780] R13: 00000000004c1016 R14: 00000000004d2c38 R15: 0000000000000006 10:42:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:35 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x92, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x30000000010, &(0x7f0000000000)="02000100020001b400000002072065480100000000000001", 0x18) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xc000000000000000, 0x80000) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f00000000c0)) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x1f, 0x4) ioctl$void(r0, 0xc0045878) 10:42:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3342.777711] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x93, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3342.892807] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:36 executing program 3 (fault-call:7 fault-nth:13): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:42:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x115}}, 0x20) init_module(&(0x7f0000000100)='vboxnet0!eth0:.wlan0\x00', 0x15, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00') r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x40002, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000000)={0x3, 0xfc7f, 0xfa00, {{0x19000000, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0xfffffffffffffffe}, r2}}, 0x48) 10:42:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:36 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000003f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x94, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3343.241545] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3343.280100] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x88}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 10:42:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x95, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:36 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:36 executing program 1: timer_create(0x7, &(0x7f0000000000)={0x0, 0xa, 0x6, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000340)={0x7ff, 0x0, 0x4, 0x270000, {0x0, 0x7530}, {0x2, 0xd, 0x4, 0x1, 0x3, 0x1, "20ac8199"}, 0x4, 0x3, @fd, 0x4}) clock_gettime(0x7, &(0x7f0000000300)={0x0, 0x0}) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x80100) getsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000500)={@broadcast, @initdev, 0x0}, &(0x7f0000000540)=0xc) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f0000000600)={@remote, 0x0}, &(0x7f0000000640)=0x14) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000780)={0x0, @multicast1, @local}, &(0x7f00000007c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000900)=0xe8) sendmsg$nl_xfrm(r4, &(0x7f0000000ac0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000a80)={&(0x7f0000000940)=@getpolicy={0x108, 0x15, 0x320, 0x70bd2b, 0x25dfdbfb, {{@in6=@dev={0xfe, 0x80, [], 0xc}, @in=@rand_addr=0x3ff, 0x4e21, 0xffff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0x7e, r5, r6}, 0x6e6bb0, 0x2}, [@offload={0xc, 0x1c, {r7, 0x1}}, @policy={0xac, 0x7, {{@in=@multicast1, @in=@empty, 0x4e20, 0x0, 0x4e22, 0x2, 0xa, 0xa0, 0xa0, 0x3a, r8, r9}, {0x2, 0x2, 0x8, 0x9, 0x9, 0x2, 0xffffffff, 0x7fffffff}, {0x5, 0x87, 0x5a4}, 0x7, 0x0, 0x3, 0x1, 0x1, 0x1}}]}, 0x108}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) ioctl$VT_OPENQRY(r4, 0x5600, &(0x7f0000000200)) r10 = getpgid(0xffffffffffffffff) syz_open_procfs(r10, &(0x7f0000000480)='fdinfo\x00') futex(&(0x7f00000003c0), 0x8d, 0x1, &(0x7f0000000400)={0x77359400}, &(0x7f0000000440)=0x1, 0x1) timer_settime(r0, 0x0, &(0x7f0000000240)={{r2, r3+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt6_stats\x00') ioctl$DRM_IOCTL_GET_MAGIC(r11, 0x80046402, &(0x7f00000000c0)=0x7) clock_nanosleep(0x9, 0x0, &(0x7f00000001c0), 0x0) r12 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_LOG_STATUS(r12, 0x5646, 0x0) ioctl$FS_IOC_GETVERSION(r12, 0x80087601, &(0x7f0000000180)) [ 3343.441538] FAULT_INJECTION: forcing a failure. [ 3343.441538] name failslab, interval 1, probability 0, space 0, times 0 [ 3343.465201] CPU: 0 PID: 20261 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #34 [ 3343.472402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3343.481751] Call Trace: [ 3343.484376] dump_stack+0x1db/0x2d0 [ 3343.488013] ? dump_stack_print_info.cold+0x20/0x20 [ 3343.493043] ? percpu_ref_put_many+0x129/0x270 [ 3343.497997] should_fail.cold+0xa/0x15 [ 3343.501900] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3343.507009] ? ___might_sleep+0x1e7/0x310 [ 3343.511211] ? arch_local_save_flags+0x50/0x50 [ 3343.515925] __should_failslab+0x121/0x190 [ 3343.520163] should_failslab+0x9/0x14 [ 3343.523994] kmem_cache_alloc+0x2be/0x710 [ 3343.528163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3343.533699] ? kvm_is_reserved_pfn+0x144/0x1c0 [ 3343.538282] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3343.543833] mmu_topup_memory_caches+0x97/0x490 [ 3343.548514] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3343.554068] kvm_mmu_load+0x21/0x1200 [ 3343.557871] ? kvm_apic_accept_pic_intr+0xef/0x1a0 [ 3343.562799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3343.568337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3343.573878] vcpu_enter_guest+0x3f0e/0x6520 [ 3343.578205] ? emulator_read_emulated+0x50/0x50 [ 3343.582895] ? add_lock_to_list.isra.0+0x450/0x450 [ 3343.587837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3343.593369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3343.598903] ? check_preemption_disabled+0x48/0x290 [ 3343.603919] ? __lock_is_held+0xb6/0x140 [ 3343.607978] ? lock_acquire+0x1db/0x570 [ 3343.611947] ? kvm_arch_vcpu_ioctl_run+0x240/0x16e0 [ 3343.616964] ? lock_release+0xc40/0xc40 [ 3343.620946] ? kvm_gen_update_masterclock+0x380/0x380 [ 3343.626186] ? rcu_sync_dtor+0x170/0x170 [ 3343.630241] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3343.635081] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 3343.640110] kvm_vcpu_ioctl+0x558/0x12d0 [ 3343.644303] ? kvm_vcpu_block+0x1010/0x1010 [ 3343.648656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3343.654200] ? lock_downgrade+0x910/0x910 [ 3343.658338] ? kasan_check_read+0x11/0x20 [ 3343.662482] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3343.667752] ? rcu_read_unlock_special+0x380/0x380 [ 3343.672696] ? __fget+0x499/0x710 [ 3343.676144] ? iterate_fd+0x4b0/0x4b0 [ 3343.679940] ? kvm_vcpu_block+0x1010/0x1010 [ 3343.684273] do_vfs_ioctl+0x107b/0x17d0 [ 3343.688264] ? wait_for_completion+0x810/0x810 [ 3343.692874] ? ioctl_preallocate+0x2f0/0x2f0 [ 3343.697288] ? smack_inode_setattr+0x290/0x290 [ 3343.701864] ? __fget_light+0x2db/0x420 [ 3343.705831] ? fget_raw+0x20/0x20 [ 3343.709301] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3343.714848] ? fput+0x128/0x1a0 [ 3343.718120] ? do_syscall_64+0x8c/0x800 [ 3343.722090] ? do_syscall_64+0x8c/0x800 [ 3343.726062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3343.731591] ? security_file_ioctl+0x93/0xc0 [ 3343.735992] ksys_ioctl+0xab/0xd0 [ 3343.739439] __x64_sys_ioctl+0x73/0xb0 [ 3343.743353] do_syscall_64+0x1a3/0x800 [ 3343.747272] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3343.752204] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3343.757223] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3343.762096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3343.767279] RIP: 0033:0x458099 [ 3343.770471] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3343.789362] RSP: 002b:00007fd857aeec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3343.797317] RAX: ffffffffffffffda RBX: 00007fd857aeec90 RCX: 0000000000458099 [ 3343.804587] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 3343.811848] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3343.819110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd857aef6d4 [ 3343.826372] R13: 00000000004c1016 R14: 00000000004d2c38 R15: 0000000000000006 10:42:37 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x96, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3343.893162] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3343.916502] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3344.071161] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3344.092249] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:37 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x8c, r1, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffd53}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x31}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x1}, 0x8010) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:42:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x97, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:37 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:37 executing program 5: socket$inet(0x2, 0x0, 0xfffffffffffffff8) r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0xff, @broadcast, 0x4e22, 0x1, 'dh\x00', 0x14, 0x1478000000000, 0x5a}, {@multicast1, 0x4e24, 0x3, 0x20, 0xfffffffffffffffb, 0x1ff}}, 0x44) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000003c0)=""/8, &(0x7f0000000080)=0x8) [ 3344.263637] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:37 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3344.305651] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 10:42:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x20, 0x4802) r1 = socket(0x2000000000000021, 0x2, 0x2) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) sendfile(r1, r1, 0x0, 0x5) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f00000000c0)={0x1, {r3, r4+10000000}, 0x0, 0x7}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000140)={{0xa3, 0x5}, {0xa6bf, 0x10000}, 0xffffffffffffffff, 0x2, 0x1}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x110, 0x7c, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f00000001c0)=0x5) [ 3344.365273] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 10:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x2, 0x0) [ 3344.621200] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:37 executing program 5: openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) semget$private(0x0, 0x7, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x100) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x9e945000, 0x3e0000}], 0x0) 10:42:37 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x99, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 10:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3344.910873] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3344.986254] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000002040)=ANY=[@ANYBLOB="14f8ff00", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000"], 0x14}}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 10:42:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x5421, 0x0) 10:42:38 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3345.393348] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:38 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:38 executing program 5: openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) semget$private(0x0, 0x7, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x100) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x9e945000, 0x3e0000}], 0x0) 10:42:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x5450, 0x0) 10:42:38 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x7fffffff, 0x400) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0xffffffffffffffff, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x0, r1}) ioctl$int_out(r0, 0x2000080000000001, 0xfffffffffffffffe) [ 3345.713042] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3345.778600] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:39 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x5451, 0x0) 10:42:39 executing program 1: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x110, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) 10:42:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e20, 0x75, @rand_addr="281f6c33143a25218f70a66725c03a2d", 0xfffffffffffffffb}}, 0x0, 0x7fffffff, 0x0, "6b66134406e2d98b307f990daa592ba733ba345e3b55bc584c6d34d9a4f86dc647284581602b5364df29d580af9fa94fd85f912ec1d86f673a0692ad15ec189bea72596895b81bc4acb7f2fa0803fc43"}, 0xd8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="c8"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:42:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3346.122742] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3346.150970] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:39 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x5452, 0x0) 10:42:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3346.468944] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:39 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0x9, 0x0, &(0x7f0000000040)) [ 3346.562751] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:39 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x5460, 0x0) [ 3346.735596] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:40 executing program 1: setrlimit(0x2, &(0x7f0000000780)={0x2000000, 0x20080000000}) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8001, 0x20000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x3f944381, 0x4) 10:42:40 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:40 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000240)=0x654) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x8, 0x0, &(0x7f0000000340)=[@enter_looper, @exit_looper], 0x0, 0x0, 0x0}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, 0x0}], 0x1, 0x0, &(0x7f0000000100), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000026000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000001c0)="64650f01d10f21c13e0fc71ee4e564260533092e0f083e3636650f1811650f01cf0f20d86635200000000f22d80f0138baf80c66b8d0ffdb8566efbafc0c66b80900000066ef", 0x46}], 0x1, 0x0, &(0x7f0000000300)=[@cr4={0x1, 0x40220}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:42:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x40049409, 0x0) 10:42:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3347.196812] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:40 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:40 executing program 1: shmget$private(0x0, 0x1000, 0x1001, &(0x7f0000ffe000/0x1000)=nil) r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f0000000180)={0x284, r1, 0x804, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3cff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7c7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe04a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff7fffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffe}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}]}, 0x284}, 0x1, 0x0, 0x0, 0x4000000}, 0x48800) sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000100), 0xfffffffffffffdaa, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0b9719580000004008"], 0xfffffffffffffd7b}}, 0x0) shmget$private(0x0, 0x2000, 0x102, &(0x7f0000ffe000/0x2000)=nil) 10:42:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x4004ae8b, 0x0) [ 3347.495137] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3347.521428] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1001020201) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='z', 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0x6) ioctl$TCFLSH(r0, 0x540b, 0x0) socketpair(0x13, 0x4, 0x8, &(0x7f0000000000)) 10:42:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:41 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000240)=0x654) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x8, 0x0, &(0x7f0000000340)=[@enter_looper, @exit_looper], 0x0, 0x0, 0x0}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, 0x0}], 0x1, 0x0, &(0x7f0000000100), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000026000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000001c0)="64650f01d10f21c13e0fc71ee4e564260533092e0f083e3636650f1811650f01cf0f20d86635200000000f22d80f0138baf80c66b8d0ffdb8566efbafc0c66b80900000066ef", 0x46}], 0x1, 0x0, &(0x7f0000000300)=[@cr4={0x1, 0x40220}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:42:41 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x4004ae99, 0x0) 10:42:41 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000000)) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f00000000c0)={0x0, @src_change}) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000080)=0x3) 10:42:41 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3348.180717] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x4020940d, 0x0) 10:42:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3348.496460] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3348.540327] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x6, {0x7, 0x1c, 0x37, 0x124008, 0x100000001, 0xffffffffe684fd9f, 0xffff, 0xfffffffffffffffb}}, 0x50) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000140), 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) sysfs$3(0x3) ioprio_set$pid(0x0, 0x0, 0x0) 10:42:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:42 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x4048ae9b, 0x0) 10:42:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:42 executing program 1: getresuid(&(0x7f0000000140), &(0x7f0000000280), &(0x7f00000002c0)=0x0) mount$9p_virtio(&(0x7f0000000080)='posix_acl_access@GPLppp1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4800, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=virtio,version=9p2000.u,cache=loose,euid<', @ANYRESDEC=r0, @ANYBLOB="2c7365636c6162656c1000467a20690ada6211f0e5163efb22fff8bf7ad209534b6d706882f846deeb40a46e6ff5569245de204ee0b20206594fa9af4ae48d99342e1d9c75da26d6d406269b4ac36432d23941e5007f6bfee0d5dbb806c37bb453b1836b2c7aba8b595a182263b44fe42cdd94324f431ea277a9ad1d5b1b37fd7e4eec8df7974ca63fcf4c765076419c38570fddca104412e2adcb0446a05eac402eee9d1eac11e5111785f72c2221b71cc32579a498129828a2887be938ab202951bf3b204504c8b950a9868a3f410fb2c517a5a7"]) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x9, 0x101000) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={@null=' \x00', 0x5, 'ip6erspan0\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)=ANY=[]) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000002340)={0x0, 0x0, 0x2080, {0x0, 0x40000}, [], "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", "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"}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x4080, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000380)=0x0) ioprio_set$pid(0x1, r5, 0x4000000000000000) getsockopt$inet_dccp_buf(r4, 0x21, 0xd, &(0x7f0000000480)=""/239, &(0x7f0000000340)=0xef) [ 3349.021785] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3349.082876] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:42 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/rt6_stats\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) prctl$PR_CAPBSET_DROP(0x18, 0x5) getpeername$netrom(r0, &(0x7f0000000340)={{}, [@rose, @bcast, @rose, @null, @netrom, @remote, @netrom]}, &(0x7f00000000c0)=0x48) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x0, @dev={[], 0x1c}, 'ip6tnl0\x00'}}, 0x1e) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 10:42:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x4090ae82, 0x0) 10:42:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x4048ae9b, 0x0) 10:42:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xaa, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3349.394695] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3349.531349] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:42 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x2000) ioctl$NBD_DO_IT(r0, 0xab03) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000001180), 0x1000) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) write$FUSE_POLL(r1, &(0x7f0000000000)={0x18, 0x0, 0x2}, 0x18) 10:42:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x4138ae84, 0x0) 10:42:42 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xab, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:42 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3349.830508] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:42 executing program 1: r0 = inotify_init1(0xfffffffffffffffc) r1 = syz_open_dev$usbmon(&(0x7f0000001140)='/dev/usbmon#\x00', 0x3, 0x40000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001180)={0x15, 0xff, 0x281, 0x9, 0x2, r1, 0x7}, 0x2c) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000040)={{0x0, @addr=0x8890}, 0x8, 0xffff, 0xb0dc}) fcntl$getownex(r2, 0x10, &(0x7f00000002c0)) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x141000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001100)={r4, &(0x7f00000011c0)="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", &(0x7f0000001040)=""/168}, 0x18) ptrace(0x11, r3) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) r6 = geteuid() setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@multicast2, 0x4e23, 0x1000, 0x4e22, 0x5, 0xa, 0xa0, 0x80, 0xbf, r5, r6}, {0x4, 0x0, 0xe4, 0x5, 0x1ff, 0x3, 0x3, 0x40}, {0x7, 0x40, 0x7, 0x8001}, 0x4}, {{@in=@empty, 0x4d5, 0x7e}, 0x2, @in=@rand_addr=0xcc9, 0x3501, 0x7, 0x1, 0x9, 0x8000, 0x1, 0xfffffffffffffbff}}, 0xe8) [ 3349.880501] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:43 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r1, 0x200001000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000001c0)={0x400, 0x0, 0x6}) 10:42:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xac, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:43 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x41a0ae8d, 0x0) 10:42:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f000004c000)=0x23, 0x4) setsockopt$sock_int(r1, 0x1, 0x2000000000f, &(0x7f0000f10000)=0xfffffffffffff830, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x4000) connect$vsock_dgram(r2, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @reserved}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) bind$inet6(r1, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) 10:42:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xad, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x101000) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200000, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x3, 0x2203) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)}, 0x0) recvmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000000)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000440)=""/229, 0x6b}, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="1b00000018008100e00f80ecdb4cb9040a4865160b000000d4126e", 0x1b}], 0x1, &(0x7f00000013c0)}, 0x0) [ 3350.235443] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:43 executing program 5: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000006c0)={'syz'}, &(0x7f0000000700)='F', 0x1, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f00000001c0)={0x4, 0x8}, 0x10) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x1d4) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000140)) connect$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x1c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005f00), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x4, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000)={0x0, 0x7f}, &(0x7f0000048000)=0x1c0000000, 0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x2000, 0x1, 0x200}) keyctl$describe(0x6, r0, &(0x7f0000000280)=""/196, 0xc4) [ 3350.322550] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xae, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x8004ae98, 0x0) 10:42:43 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xaf, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3350.618474] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:43 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3350.676337] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:43 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x400) ioctl$SG_GET_REQUEST_TABLE(r0, 0x5385, 0x0) 10:42:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r1}}, 0x48) r2 = socket(0xa, 0x80a, 0xffff) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000100)={{0x81, 0x9, 0xfffffffffffffffd, 0x100, 0xce, 0x8ea}, 0x7}) 10:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x8090ae81, 0x0) 10:42:43 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3350.852587] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:44 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3350.913807] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x334}}, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = getpid() tgkill(r2, r3, 0x35) r4 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x100000000, 0x600000) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0xd) r5 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000100)={0x81, 0x0, @name="d5ba0df01f18cbffe26a499f9394ab25922c554cfcfb28f6ccbc9bef3b98b4f1"}) 10:42:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x42, 0x40000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x100, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x141b3, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8}]}}}]}, 0x3c}}, 0x0) 10:42:44 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3351.109160] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3351.145747] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x8138ae83, 0x0) 10:42:44 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3351.156862] bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 [ 3351.192016] bond0: lo is up - this may be due to an out of date ifenslave [ 3351.247151] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 10:42:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="990000002e00000027000000000000009500000000000000"], &(0x7f0000000480)='GPL\x00\x83\xff\x13\x0f_\xb0\x0e][d\x9b\x18r\xd22CT\xb6\xe2wp\xc5\xa6$\x1e\x8d\xef\xd6S>*\xe1&\xbee\\l\x12cI!l0\xbb\x1f\x80\xfb7\x0e\xc0\xd5\xbe\xe7\x82\xafW\x8d\f<\xc1\x8d\x1e\x8b=+6\xfb\xf4\xe4\xba\xb3\xff\xf4\xcb\x94\xb8N\x91j\xc4\x85F\xd3I\xb7\xbb\xf3\x9a\xf2\r\a*\xd1\x9c\x1d\xe0\xdet+\xad\x10\xb2\xba\xb4\x8fa\x96\xe5-o\xec\x94\x17\x98\xceKF5\xb1\xd1\x1ct\xac\x89j\xa0\xb6\xc3>\xb1U$\xeaC\'\xd2\x98\xd1\xb6(\xba\x00B\xa0\xbc,\xaaI\xb9\xe2`QD\xe7\xbcWX\xb5\x89\x8a\ne\x85\xad\xd0\xd0\x1d\x96\x9a\xf9\xc1\xa5\x9b\x9ce %\xd4\xf1U\x03[\xf4\x92\x8d\xaf\xfe\xd3\xdf\x92>\x81\xdf\xd9\xf74\x1ajS\xfc\x1dn\x02\xad~\xdc\xbea\x02C\x1d\n\x04\x049\xda$\t\x8c\xa2\x9f\xf6\r\x9e\xacp\xd2\x8d~\xa4\x97\x88>\xfdW\xf3U\x96\xd9\x18t\xb2\xfd\xee<\x965\x94n\xbc\b\xc9.\xd6\x94ov\x8e\xaf\x05l\xbc\xa6,\x1c\xa59Q\xa9~\xfc\xa7\x1e\xb53\x9aH\xb4\aqh]m\xb6,\xe3\xc52|J\')7\x10n4\xb3;/N\xf6/\x1c\x1c\x87b\xc1\x89\xf4\xc8{\xe8Ab\xe2\x8e\t\v\xe5\xf6\xfcnQ\v?\xaf\xf2\xd9\xc0\x9d<\b\xd4\xf6\xa1\xe0$\xca\xe6\xffX\xe4\xc3\x1c\x03\x93\xf6X\xb7\xad}\x83\xf7\x1a=\xb0\xe3\xc6', 0x1, 0x99, &(0x7f0000000600)=""/153}, 0x48) 10:42:44 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3351.360804] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0x81a0ae8c, 0x0) [ 3351.444579] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:44 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r1, &(0x7f0000000140), 0x6) listen(r1, 0x0) dup3(r0, r0, 0x0) 10:42:44 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xc0045878, 0x0) [ 3351.831455] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3351.876002] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:45 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80900, 0x106) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000040)={{0x8, 0x6, 0x4, 0x81, 0x1, 0x2}, 0x47a, 0x10000, 0xfffffffffffff800}) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x3ffff, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x10, 0x0) 10:42:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xc0045878, 0x0) 10:42:45 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000003f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='yeah\x00\x11\x8d\xc6~<\xc3Z\xb7\xd4\x0e#>\xa2\xf6\x83_4\xa8\xc5\x12\x91\xa9q\xb2\xa7\b\x03\x17t\xc4\xb5\xe0\xe1d\bE\xe6\xad\xaf\x0fh\xc3\xe6\x83\x8f}A\xe7h6\x9e\xcb\xb0\xbdwI\x1a\x1b3\b\\\xb5{9\xdf\x18Y\xb8v\x00\x00\x00\x00\x00*\xbd\x9b\xd8\x88z)\x16\x13lX\xabD\xf8\xa9?\x1e\xbeqQ`\x14\xe5\x8f\xce\xbaJ\xec\xc0Z\x13#q\xcf\x9eF+\xc6\xa4[\x99\x8e\xc1\xd07VG>QrZ\xa3\xc3rYma7\x04\x06!\xf0\x98n\v\xb1\xafi\x91\x03\x8f\xb6h*}k\xbd\xb8\x86X\x03\xa6\xe2\x96\x0f/\x8eim]87|\xf5\xe8 v\x93\xcd\xb0\'\x1a\xa0\x8c\x1cU\xf1\x997$%h#S\xfe\xbe\xda\xc3\x99)\xcc\\\x04l\xa45\x9d\'\x14\xb9\xb1\x94\xfbhb\xe4\x9f dq', 0x46) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x1fc, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x3) [ 3352.213830] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:45 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000003, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x291408f8}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000003c0)=""/177, 0xb1) 10:42:45 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3352.258919] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xc0189436, 0x0) 10:42:45 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:45 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:45 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000003, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x70, &(0x7f0000000140)={r1}, &(0x7f0000000000)=0x90) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0xa25b, 0x80000) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000200)) 10:42:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xc018ae85, 0x0) [ 3352.619867] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:45 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x100000001, 0x224280) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) shmctl$IPC_RMID(0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000002640), 0xb33, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902002001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) getresgid(0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="66b9ad0300000f320f01c8d926bd580f0054080f21ffba200066ed0f01cf0f30d9fe8e03", 0x24}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) ioctl$KVM_RUN(r1, 0xae80, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 3352.668609] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:45 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x800, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) syz_emit_ethernet(0x2a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800450000140000021800008078ac141400e00000020000000000089078"], 0x0) 10:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:46 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xc020660b, 0x0) [ 3353.009881] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:46 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:46 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7fff, 0x220002) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @local}}) [ 3353.217494] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="850400000000000007000009cacaf2a180fad8dd27009500000000000000eb9543f6"], &(0x7f0000001040)='GPL\x00', 0x2, 0xfffffffffffffe8a, &(0x7f0000000040)=""/4096, 0xfffffffffffffffe}, 0x48) 10:42:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x2) 10:42:46 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3353.266129] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xba, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3353.329476] IPVS: ftp: loaded support on port[0] = 21 10:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xbb, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3353.411270] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:46 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e5, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x8000000d, 0x803, 0x82) write(r1, &(0x7f00000001c0)="2400000021002531075f01650272fc028000002f0010fd0033ff000c080017003c090000", 0x24) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0x10001, &(0x7f0000000080)=0x4) bind$alg(r1, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0xfffffffffffffded) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)=0x0) connect$rds(r1, &(0x7f0000000240)={0x2, 0x4e21, @multicast2}, 0x10) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x9, 0x101, 0x5, 0x0, 0x0, 0x8, 0x800, 0x4, 0x8, 0x9, 0x4838, 0x4, 0x1, 0x5, 0x7, 0x0, 0x401, 0xffffffffffffffff, 0x2, 0x100, 0x5, 0x5cc6, 0x2, 0x969, 0xffffffffffff0000, 0x5b972753, 0x7, 0x7, 0xffffffffffffff81, 0x0, 0x7, 0x0, 0x81, 0x100000001, 0xffffffffffffffe0, 0x10000, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x80, 0x1ff, 0x5, 0x3, 0x400, 0x7, 0x4}, r2, 0x6, r0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x400001) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000340)) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000300)) [ 3353.486920] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:46 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xbc, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x3) [ 3353.688878] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3353.822631] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:47 executing program 1: r0 = memfd_create(&(0x7f0000000380)='fdin\x1f\xa2/3\x00', 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x10000, 0x4000) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000340)=0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000500)={0x7fff, 0x7fff, 0x7, 'queue1\x00'}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_TIMEOUT(r3, 0xab09, 0x3) r4 = semget(0xffffffffffffffff, 0x0, 0x40c) semctl$SEM_INFO(r4, 0x0, 0x13, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00)=@assoc_value, 0x0) r5 = creat(0x0, 0x100) mkdirat(r5, &(0x7f0000000140)='./bus\x00', 0x80) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r7 = open(&(0x7f0000000200)='./bus\x00', 0x500, 0x14c) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f00000000c0)={@dev, @loopback, @loopback}, 0xc) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) r8 = getpid() perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x5, 0x4500000000000003, 0x2200, 0x0, 0xa0004700, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xebfffffc, 0x3f00, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r8, 0x0, 0xffffffffffffffff, 0x8) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000003c0)=0x4) getgid() mount$9p_fd(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='9p\x00', 0x4002, &(0x7f00000004c0)=ANY=[@ANYBLOB='Sw\"lIent,fw']) write$RDMA_USER_CM_CMD_GET_EVENT(r6, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) msgget$private(0x0, 0x80) bind$vsock_dgram(r2, &(0x7f00000002c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) ioctl$TIOCSCTTY(r5, 0x540e, 0x1) getsockname$netlink(r0, 0x0, &(0x7f0000000080)) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r7, 0x40045532, &(0x7f00000005c0)=0x100000000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, 0x0) 10:42:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:47 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) mkdir(&(0x7f0000000100)='./control/file0\x00', 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000140)={0x0, "1edfde7c5412a6f40c28ecb79cbf1cdc1bc113b5b82f02b67eaff57735e33e73", 0x801, 0x1, 0x80000000, 0x4, 0x4}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x10, 0x4) 10:42:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xbd, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:47 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x4) 10:42:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xbe, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3354.174902] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3354.203009] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3354.282424] audit: type=1804 audit(1547980967.317:876): pid=21060 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir807698405/syzkaller.aKGlET/495/bus" dev="sda1" ino=17121 res=1 10:42:47 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x5) 10:42:47 executing program 5: mkdir(&(0x7f0000000040)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) mkdir(&(0x7f0000000100)='./control/file0\x00', 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000140)={0x0, "1edfde7c5412a6f40c28ecb79cbf1cdc1bc113b5b82f02b67eaff57735e33e73", 0x801, 0x1, 0x80000000, 0x4, 0x4}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x10, 0x4) 10:42:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3354.405599] audit: type=1804 audit(1547980967.437:877): pid=21060 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir807698405/syzkaller.aKGlET/495/bus" dev="sda1" ino=17121 res=1 [ 3354.493284] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3354.550229] audit: type=1804 audit(1547980967.437:878): pid=21075 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir807698405/syzkaller.aKGlET/495/bus" dev="sda1" ino=17121 res=1 10:42:47 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_BT_POWER(r0, 0x112, 0x4, 0x0, 0x0) io_setup(0x6, &(0x7f0000000000)) 10:42:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xbf, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3354.602279] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:47 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) set_mempolicy(0x0, &(0x7f0000000000)=0x5, 0x7) r1 = fcntl$dupfd(r0, 0x0, r0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x0) 10:42:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x6) 10:42:47 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:47 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x400000, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000100)={0x3, 0x1, [0xffffffffffffffff, 0x1, 0x8, 0x2, 0x6, 0x0, 0xfffffffffffffbf3, 0xffff]}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)=0x400000) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={0x0, @remote, @rose={'rose'}, 0x0, 'syz0\x00', @netrom, 0x0, 0x0, [@default, @remote, @null, @default, @bcast, @rose, @rose, @rose]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x204400, 0x0) 10:42:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f00000000c0)=""/25, &(0x7f0000000240)=0x19) 10:42:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3354.865357] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3354.907480] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:48 executing program 1: getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYBLOB="c30000000b361123b404f806e08727c86bf128b92309a692e71cce59add807941b081c23086b88ec84542bda5f4df03e62e339e17dbb6d18b7b876ee9ab603c0e7c77962afc4ddf7e40c2227281ac8cea7ae9c3d86760da30a"], 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3f, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'system.', '\x00'}) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x3, @win={{}, 0x0, 0x0, &(0x7f0000000200), 0x2, 0x0}}) 10:42:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x7) 10:42:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:48 executing program 5: syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bond_slave_0\x00', 0x3700}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000540)=""/19) r3 = socket$inet(0x2, 0x3, 0x2) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000200)={'veth0\x00', 0x1f2}) getsockname(r4, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000800}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="b2475de4b5bb00007000fcdbdf250c0000000c00034b5f8eb91c5ba76125c8d317dcdf23000800040008000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x2000c811) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000100)=0x1, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) dup2(r1, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) lsetxattr$security_ima(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000600)=ANY=[@ANYRESHEX=r5], 0x1, 0x3) setxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x4ab, 0x10000}, {0x5, 0x4}]}, 0x14, 0x3) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f00000000c0)=0x6e, 0x800) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x100, 0x400}, 0x6) socket(0x11, 0x80002, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) 10:42:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3355.176682] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:48 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) setsockopt$rose(r0, 0x104, 0x3, &(0x7f0000000000), 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x40000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) getpeername(r0, &(0x7f0000000280)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000300)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'team_slave_1\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000500)={0x0, @initdev, @remote}, &(0x7f0000000540)=0xc) accept4(r0, &(0x7f0000000580)=@hci={0x1f, 0x0}, &(0x7f0000000600)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000700)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001d00)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000040c0)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f00000041c0)=0xe8) accept(r0, &(0x7f0000004240)=@hci={0x1f, 0x0}, &(0x7f00000042c0)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000048c0)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@broadcast}}, &(0x7f00000049c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004a00)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004a40)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000004b40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000004f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004f40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004f80)={0x0, @multicast2, @broadcast}, &(0x7f0000004fc0)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000005000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005040)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000005280)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000006440)={0x0, @loopback, @multicast1}, &(0x7f0000006480)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x14, 0x80800) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000066c0)={@multicast1, @loopback, 0x0}, &(0x7f0000006700)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006740)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@initdev}}, &(0x7f0000006840)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000006880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000068c0)=0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000006b80)={&(0x7f00000069c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006b00)=[{&(0x7f0000006a40)=""/162, 0xa2}], 0x1, &(0x7f0000006b40)=""/21, 0x15}, 0x102) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000006bc0)={@local, @broadcast, 0x0}, &(0x7f0000006c00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000006c40)={0x0, @multicast1, @dev}, &(0x7f0000006c80)=0xc) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000075c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000007580)={&(0x7f0000001240)=ANY=[@ANYBLOB="98080000", @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYBLOB="5c0a9f545411c4070ed8ab9d36d7248e6235d963a83c37"], @ANYBLOB="00042abd7000fedbdf250000000008000100", @ANYRES32=r2, @ANYBLOB="f000020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e00003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r3, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000600000008000100", @ANYRES32=r4, @ANYBLOB="e001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000600000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000600000008000600", @ANYRES32=r6, @ANYPTR64=&(0x7f0000001140)=ANY=[@ANYRES64=r15, @ANYBLOB="b08bfb423faffaf1ffc7d3f67b993c9ca7128e4dbe445bcdd091af0b3d78f538121661256ef05ef21edc019a2028b83797a1ddbde4cd613eefba8e6950071c7ef1c18418d710119b1cc2bb2e6860b61923a689751d28de79356530c3bac672cbcd41127020f09d4813e57d02e9e58de8dfd0009dab0a637ac121dd5fb56ac4fad73ffd2b416226ec39e04c2fb5bad87e9861ab13d22d556c64b1ba8df70a58f4d67cb01cf9ebf3263baefd079ce1cb1d8d236ac3f58694550eb0fbff0beecd206a68b0af94d43ef8ba6a2f9d358a4da960eded028abfd3d18538c2e1b58caa8556639deed41515039b25"], @ANYRES32=r7, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000600000038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040047feffff3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="2c01020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000600000038000100240001006e6f746966795f70656572735f636f756e74000000e5ffffffffffffff000000080003000300000008000400ff06000000000000000001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000180000008000600078a4725a2645b7b95253a43ed2b7801e53a099a1f253609a09b7c84c94f47c70166f958f92ef5096318f803c869f5926c75d09cae63e7409c34e003a93654d1a34518d3f4ec05", @ANYRES32=r11, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004004000000040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r12, @ANYBLOB="2c0102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ff0f000008000600", @ANYRES32=r14, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000300000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000800000008000100", @ANYRES32=r16, @ANYBLOB="b800020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000500000008000600", @ANYRES32=r17, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004001f6500003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r18, @ANYBLOB="08000100", @ANYRES32=r19, @ANYBLOB="2c01020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004008203000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400050000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000300000008000600", @ANYRES32=r21, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="08000100", @ANYRES32=r23, @ANYBLOB="4001020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000002000008000600", @ANYRES32=r24, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r25, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040005000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32=r26], 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x8014) 10:42:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3355.259681] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x8) 10:42:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3355.600542] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3355.657335] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000e000000100000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044000500ff010000000000000000000000000001000000000000000000000000e00000010000000000000000000000000000000000000000000000000000000000000000"], 0x16c}}, 0x0) [ 3355.939158] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3355.996094] netlink: 68 bytes leftover after parsing attributes in process `syz-executor1'. 10:42:49 executing program 5: syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bond_slave_0\x00', 0x3700}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000540)=""/19) r3 = socket$inet(0x2, 0x3, 0x2) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000200)={'veth0\x00', 0x1f2}) getsockname(r4, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000800}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="b2475de4b5bb00007000fcdbdf250c0000000c00034b5f8eb91c5ba76125c8d317dcdf23000800040008000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x2000c811) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000100)=0x1, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) dup2(r1, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) lsetxattr$security_ima(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000600)=ANY=[@ANYRESHEX=r5], 0x1, 0x3) setxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x4ab, 0x10000}, {0x5, 0x4}]}, 0x14, 0x3) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f00000000c0)=0x6e, 0x800) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x100, 0x400}, 0x6) socket(0x11, 0x80002, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) 10:42:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)="585ccbf5a24f3445ea9a46da8e74471027e4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308fd73f4772539", 0xce, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x00\x00\x8d\xff\xff\xff\x00\x00\x00\x00\x00kkk\x00'}, &(0x7f0000000700)}) 10:42:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x9) 10:42:49 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3356.169708] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:49 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xa) 10:42:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x5c2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000380)={0xffff, 0x400, 0x0, 0x1, 0x1000, 0x5c, 0x392f, 0x0, 0x0, 0xfffffffffffffffd}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000200), 0x4) getresgid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000240)) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000700)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) stat(&(0x7f0000000840)='./bus\x00', &(0x7f0000000880)) getgroups(0x3, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0]) getgroups(0x4000000000000129, &(0x7f0000000940)=[r1]) mkdir(&(0x7f00000004c0)='./file0\x00', 0x3) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x8000000000044000) io_setup(0x9, &(0x7f0000000400)=0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000005c0)=0x40) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000002c0), 0x10, &(0x7f0000000340)={&(0x7f0000000600)={0x7, 0x200, 0x1, {0x0, 0x2710}, {}, {0x3, 0x0, 0x8, 0x7f3}, 0x1, @canfd={{0x2, 0xffffffffffff7fff, 0x80000001, 0x652}, 0x2c, 0x3, 0x0, 0x0, "211b79eece694ef10ddceca708ce805bd3e8bf1bec6d27b4088a3a2c29b6a6bcbeaf56347749a52a636c7dc06cce5a3b645e296bb9562302405305924f8e0c9b"}}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000140)) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000, 0x407000}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x1, 0xfffffffffffffffc, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8000}, 0x0, 0xc, 0xffffffffffffffff, 0xb) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'bcsh0\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000480)={@loopback, r4}, 0x14) mount$bpf(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='bpf\x00', 0x0, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x34f}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x4}}], [{@smackfshat={'smackfshat', 0x3d, '/dev/ptmx\x00'}}]}) [ 3356.455136] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:49 executing program 5: syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bond_slave_0\x00', 0x3700}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000540)=""/19) r3 = socket$inet(0x2, 0x3, 0x2) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000200)={'veth0\x00', 0x1f2}) getsockname(r4, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000800}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="b2475de4b5bb00007000fcdbdf250c0000000c00034b5f8eb91c5ba76125c8d317dcdf23000800040008000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x2000c811) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000100)=0x1, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) dup2(r1, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) lsetxattr$security_ima(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000600)=ANY=[@ANYRESHEX=r5], 0x1, 0x3) setxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x4ab, 0x10000}, {0x5, 0x4}]}, 0x14, 0x3) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f00000000c0)=0x6e, 0x800) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x100, 0x400}, 0x6) socket(0x11, 0x80002, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) 10:42:49 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3356.743211] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:49 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xb) 10:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3357.098732] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:50 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r2 = gettid() bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0x0, 0x8}, 0xc) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1, {0x1, 0x7, 0x6, 0x5, 0xfff, 0x58}}) perf_event_open(0x0, r2, 0x0, 0xffffffffffffff9c, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) 10:42:50 executing program 5: syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'bond_slave_0\x00', 0x3700}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000540)=""/19) r3 = socket$inet(0x2, 0x3, 0x2) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000200)={'veth0\x00', 0x1f2}) getsockname(r4, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000800}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="b2475de4b5bb00007000fcdbdf250c0000000c00034b5f8eb91c5ba76125c8d317dcdf23000800040008000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x2000c811) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000100)=0x1, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) dup2(r1, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) lsetxattr$security_ima(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000600)=ANY=[@ANYRESHEX=r5], 0x1, 0x3) setxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x4ab, 0x10000}, {0x5, 0x4}]}, 0x14, 0x3) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f00000000c0)=0x6e, 0x800) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x100, 0x400}, 0x6) socket(0x11, 0x80002, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) 10:42:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xc) 10:42:50 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xca, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3357.386003] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:50 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xcb, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xd) 10:42:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xcc, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xcd, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:51 executing program 1: set_mempolicy(0x4002, 0x0, 0x9) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000500)={0x0, 0x6}, &(0x7f0000000580)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x401, 0x0}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000100)={0x4, r1}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000140)={'ip6erspan0\x00', 0x53}) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a70c0300, 0xa7, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) 10:42:51 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x4dd2c9c61937671d) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000440)=""/51) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000280)={0x0, 0xff}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000300)={r1, 0x7ff}, &(0x7f0000000340)=0x8) r2 = socket$pppoe(0x18, 0x1, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000380)={0x9, 0x9939, 0x1}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = semget(0x3, 0x2, 0x305) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7fff) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000003c0)=@int=0x7f, 0x4) getpeername$ax25(r3, &(0x7f0000000180)={{0x3, @bcast}, [@bcast, @null, @bcast, @rose, @rose, @bcast, @netrom, @bcast]}, &(0x7f0000000200)=0x48) r6 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x100, 0x20000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) bind$vsock_stream(r6, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) semctl$SETVAL(r4, 0x0, 0x10, &(0x7f0000000000)=0x8) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x2, @local, 'batadv0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f0000005b40), 0x40000000000014d, 0x0) poll(&(0x7f0000000400)=[{r5, 0x1}, {r2, 0x8436}, {r2, 0x5120}, {r2, 0x440}], 0x4, 0x1) seccomp(0x1, 0x0, &(0x7f0000000080)={0x20000000000001ee, &(0x7f0000000040)=[{0x22}]}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thre\x85ad-self/aP~r\xaffscreate\x00\xc7k\x03\xd4f\xdb\xac\x92\xa8\x16U\xe5\xb7Q27\x17\x85\xdc\xdb\x8a\xf3\x9a\xea\x18QOY\x92\xdc\xd9\x19\xc2\xf04\xe7\x8a\x84\xf2\xd2=\x05\xa3Q<\x12@\x8e\x02\f\xa5\x869W#\xfa\xe5\xb7', 0x2, 0x0) 10:42:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xe) 10:42:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:51 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xce, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:51 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xcf, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:52 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xf) 10:42:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xd0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xd1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="30000095bbc59bcc6e1ac300000000000a000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000080014000000000008001b0000000000"], 0x30}}, 0x0) 10:42:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/protocols\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400201) clone(0x21200000, &(0x7f0000000140), 0x0, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) waitid(0x0, r2, &(0x7f0000000080), 0xa0000004, 0x0) 10:42:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x10) 10:42:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xd2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x3, 0x200) fchmodat(r1, &(0x7f00000001c0)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000000)='cwd/..\x00\x00\xd8s\x11Z\xb9\x8f\'PO\xf8\x83\x1aYb\xa6\x00\x8bZY\x86W\xb43K\x88\x16\xac\xeb\xdf\xf1\x90\x06E\xe0)@\x05A\a\xcb\"\x89t\xd5L)\x82\xdd*8\x02\xb0D\x9do\x05\x1a\xc1\"\x05\x00G|\x83M\x8e<\xb8\xed;F\xaf\x12\xe4RKa]%\x8b]\xba\x87G\xda\xf1\xdf\xf5\x19j\x13~9\x8bF\t\f0\xd0R\xeaD\xb8\x06\x00\xd0\x18\xc5}\xc5\x03\xdd\x98\xb8\b$\xdf\xf5\xd6j!.\xa1\xc9\xa3\x1c\xe9\xf16\'$\x89F\xb0\xc9\xa4\x1d\xae\x96\xb7\x12\xb8\x86\x93Nbv2\x9dH\xf1B=y\xfa\x17\xd0\x85\x14\xd2\x13\xb36\xb9\xa5=\x9a\xcd\xe0\xd5R\xe0\xfe\x8e(\xce\x8as\xba\xe9RE\x1a7D\x8f\xc2\x80\x84(\xcc\xa3\xd4\x00Ch\xf3\xe1\xa5\x97\xf5;,\x98#\xc7;mS4\x83Pb\x8f\xeb@`0qG\x9f\bF\x02\xce\x96-\xb5\x0f\x95\xf9y\xea\xef\f\xc7\xd3\xb8\x9db\xc2\xbc\x83r\x147\xf1\xe2\xed6~lq\xea\xc4\xe3\xad\xf7(x\xb6\xb9_\xa4^\xb2\x0f\x01DY\x9a\x15j\xed[,\xb9\xdc\x15X}\xf6\xfacg\x1es\x83\xcbnu\xe0tJW\x8cF\xb9\x95?fW \r)K\xcd\x16\x83\xa6\xc2q\xf9\xcb\x89.\x94\xb5=o\xd4\xedj{\xe1\x03\xc6o>\xc6\xf4\xfe5>\xe0P\xe4\xebjM\xb0ZtV\xbeiyk\b*\\\xbb\xfb#\xb4l\t\xac') [ 3359.613228] IPVS: ftp: loaded support on port[0] = 21 [ 3359.965991] chnl_net:caif_netlink_parms(): no params data found [ 3360.040163] bridge0: port 1(bridge_slave_0) entered blocking state [ 3360.046675] bridge0: port 1(bridge_slave_0) entered disabled state [ 3360.053518] device bridge_slave_0 entered promiscuous mode [ 3360.060354] bridge0: port 2(bridge_slave_1) entered blocking state [ 3360.066957] bridge0: port 2(bridge_slave_1) entered disabled state [ 3360.074393] device bridge_slave_1 entered promiscuous mode [ 3360.097526] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3360.107184] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3360.145574] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3360.152932] team0: Port device team_slave_0 added [ 3360.158669] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3360.166315] team0: Port device team_slave_1 added [ 3360.171602] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3360.179191] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3360.257676] device hsr_slave_0 entered promiscuous mode [ 3360.314550] device hsr_slave_1 entered promiscuous mode [ 3360.374882] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3360.382204] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3360.395866] bridge0: port 2(bridge_slave_1) entered blocking state [ 3360.402215] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3360.408915] bridge0: port 1(bridge_slave_0) entered blocking state [ 3360.415277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3360.451167] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 3360.457710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3360.469855] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3360.478176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3360.485656] bridge0: port 1(bridge_slave_0) entered disabled state [ 3360.492354] bridge0: port 2(bridge_slave_1) entered disabled state [ 3360.506335] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3360.528808] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3360.534950] 8021q: adding VLAN 0 to HW filter on device team0 [ 3360.543599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3360.551446] bridge0: port 1(bridge_slave_0) entered blocking state [ 3360.557848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3360.574847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3360.582475] bridge0: port 2(bridge_slave_1) entered blocking state [ 3360.588890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3360.611586] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3360.622114] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3360.632745] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3360.640797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3360.648594] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3360.656737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3360.664391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3360.671858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3360.672355] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3360.694605] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3360.710158] 8021q: adding VLAN 0 to HW filter on device batadv0 10:42:53 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:53 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xd3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:53 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@gettclass={0x24, 0x2a, 0x200, 0x0, 0x0, {0x0, 0x0, {}, {}, {0xe}}}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x1) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6000000000000003, 0x7) io_setup(0x5ae, &(0x7f0000000040)=0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x101000, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x7, 0x4000) r5 = syz_open_dev$usb(&(0x7f0000001680)='/dev/bus/usb/00#/00#\x00', 0x2, 0x101000) ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f0000001c00)={0x9, 0x1000, "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"}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/sequencer2\x00', 0x0, 0x0) r7 = syz_open_dev$usb(&(0x7f0000001980)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x4000) r8 = syz_open_dev$admmidi(&(0x7f0000001b00)='/dev/admmidi#\x00', 0x63, 0x201) io_submit(r2, 0xa, &(0x7f0000001b80)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x101, r1, &(0x7f0000000100)="c35a840ba03a1d69a26eae4b4a20a77df720fbad1099b5243215a8d7a21ae325f3e2b0fe0b8f55aedb1a2c7069b56188ca8f983419c451ba4e8df5a53517d1fe7eb0dda6e5f2c45db63948320b649ebf902b83", 0x53, 0x7, 0x0, 0x1, r3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xf, 0x200, r0, &(0x7f0000000380)="dbe2d58c443570472cf9defe0409e89c86e5d29b8b51997faac4e2bc061cace06da43c23ed3bf65b7dff82087c4fbf038a5a6b8360cce4f8cfd1c0f0ba66cc94f8cdb06a0206adca522108d7883ac97b72495d31fbd0a9677cbafe871c37508bad996d102c956f9fb8e530264d1dd5fe485d1a5ec30b6f370f172c29948f0c8986761c7dbc776a5e7d", 0x89, 0xe7b4, 0x0, 0x1, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x9, r0, &(0x7f0000000440)="164754ebe87ba8b0650b0495ceb42adf0ea83899ca7572be43b755f2c0a89b8c19c83dce6e13b053c384c099a60e39f70ff22dd19d0d0268d5df5e372456c7e107825eac1d28cbf2e46dab1030a146ee03d0d35da8057aa7a3f21e3e79bf509217b18e1bd5f3e68983078dca7f8019d5268fdcf5ef1085d7c16e2140e04c64a8efce80a5e84a64d284efe608c022f7151f05100065289a13d2a32ef17ae22b95dc68b60ff509e860af732e5762", 0xad, 0x7fff}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x2, 0x6, r1, &(0x7f0000000540)="7bfb2e35191f99ef922a25e1e8544082bf145585c302db25a1fad340323a762d47be6f50c8ba21c2f525e231c12b7363ac4786c51fe4fa93b5745372eb73a785847b40edb41133307a09d497fca583e9d2caca0899a60e34423dfab037e10dcec79ee247b50b", 0x66, 0xfff, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x6, 0x3, r0, &(0x7f0000000600)="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", 0x1000, 0x1, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x6, 0x3, r0, &(0x7f0000001640)="fd78326c038f2728a3", 0x9, 0x3, 0x0, 0x0, r5}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x8, 0x3887, r1, &(0x7f0000001700)="7ffb9b48a5054ae2b996517e8382001bc662b5419d4d5e010da6810c0f2fa351b1c6d224b88c36ef53a6f276bf0d3d9586779e6c8487bab9af288d03b13c6076de42fc556aa139da27fb940be699a7", 0x4f, 0x0, 0x0, 0x2}, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x7, 0x2, r1, &(0x7f00000017c0)="5eaefb26d609a670c938efba124ddade40f4324fad5109f2243fab37481f6262ee89cfd65dac23784a8b937f6a6633b8edc886471f1b61e8bc8f0f584f72d66f546deef6c1c7feebfa8065220616e62c4944ede47d7014afb78d6922bcb5caaf59cef455d6460a85a724ea58473fa77a80790c738b79d2b91dad59df66efbb5e2839db21d8a93fe34e0e9f5d4665d1d885423d53dc36b00106ea7f924809c3e6322cdad7aee71e76bfddf488b0f021a05b2dd4ff21217c125ef05048257ed894044cd1505071a9f93a96be266ebe", 0xce, 0x40, 0x0, 0x1, r6}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x2, 0x8, r1, &(0x7f0000001940)="73a24efcb565136757168638f57cfbfa65c56e4dd04a5ad9ea0b590ea23ad6e28305dcc2b0", 0x25, 0x6, 0x0, 0x1, r7}, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x5, 0x9, r0, &(0x7f0000001a00)="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", 0xfa, 0x39, 0x0, 0x3, r8}]) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) sendto$inet(r1, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0xa) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 10:42:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x11) 10:42:53 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) recvmmsg(r0, &(0x7f00000042c0)=[{{0x0, 0x0, 0x0}}], 0x229, 0x10100, 0x0) shutdown(r0, 0x0) [ 3360.766856] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3360.778435] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xd4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3360.955570] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f023c123f3188a070f040f761bab7c52d678b96e4296147949617fbd4c3a278672a1fedb5aa53fd4e58c821dbe2d07f2040d83ca40c0e6d1c09647253f2e35f01cc1f8d05c06e000000002fbbf96e2e4d288f917c08f7aec23a990366dfc5ca7f5f978cb97d87cf5934f2cbbe1f700889b294ad4e5fa76b67f0434fe2080b0f65d1f9defcc119ade2a1ce0186156cca45e6a2d03ceb679d4cba160c60d5aa86f071480d83c545de075edd70e5eea60171e8a65bead0c3cb599356b8609025a6b439af5b372755a775d69455262fca460c9223077da05e803b54040e10b725ab016d1e") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000140)={{0x5, 0x4}, {0x3, 0x1}, 0x4, 0x5, 0x93b}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40085112, &(0x7f00000000c0)={{0x7fffffff, 0x9}}) [ 3361.001734] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3361.027351] device bridge_slave_1 left promiscuous mode [ 3361.032836] bridge0: port 2(bridge_slave_1) entered disabled state 10:42:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:54 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000003f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:54 executing program 1: r0 = gettid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) r5 = inotify_init() pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) write(r7, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$notify(r5, 0x402, 0x9) socket$inet6_udp(0xa, 0x2, 0x0) write$eventfd(r6, &(0x7f0000000040), 0x8) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r8+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0xf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x4e20}, {0x2, 0x0, @loopback=0x7f003100}, {0x2, 0x4e25, @broadcast}, 0x0, 0x8, 0x5, 0x46a}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl(r2, 0xfff7ffffffffffc8, &(0x7f0000000080)) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x18880, 0x0) ioctl$KDSKBMODE(r9, 0x4b45, &(0x7f0000000100)=0x3ff) fcntl$setownex(r1, 0xf, &(0x7f0000000300)) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2000, 0x0) [ 3361.126175] device bridge_slave_0 left promiscuous mode [ 3361.140628] bridge0: port 1(bridge_slave_0) entered disabled state 10:42:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x12) 10:42:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xd5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3361.223093] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:54 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3361.309952] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xd6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:54 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x13) [ 3361.434088] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3361.459671] device hsr_slave_1 left promiscuous mode [ 3361.531431] device hsr_slave_0 left promiscuous mode 10:42:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xd7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3361.593343] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3361.614684] team0 (unregistering): Port device team_slave_1 removed [ 3361.651944] team0 (unregistering): Port device team_slave_0 removed [ 3361.667290] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3361.707158] bond0 (unregistering): Releasing backup interface bond_slave_1 10:42:54 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3361.786783] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3361.867294] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3361.896684] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3361.972921] bond0 (unregistering): Released all slaves 10:42:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000001580)={0x6, 0x992, &(0x7f0000001400)="6038427b1fcb2bb34542d48157ac899b61ffaa306206596737072b45853ea713db8e943b1af5cdcda3f8ce48dcb010c25e0974929c4b74e599fabe19b386e082bcdf946c72d67fce0107fd312d0849d4c4f929a159f9b5f5ec63b070e500bb519291924b10ca3ec723", 0x0, 0x69}) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) mq_notify(r4, &(0x7f00000000c0)={0x0, 0x2861c2e6, 0x2, @thr={&(0x7f0000000140)="47fc5d70edbc6021da3ec0cbbb2aa768283560a8285dbfad71344ca71145874d036df39626de6112cbf244857c0bace9f631abf24f0ed2ef669370f96fbe0f2858912e81ab4b330d3a62712ddacfa731384a194836a36f3ba6a5ab9655740d8d92780e376db2a9016c2f682671bfe12f44dd91cd795276ba1a1f37172b5a83eaa818c3f17e5eb22db79336ce2e5d", 0x0}}) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="d00000000000000081000000000000000500000000000000", @ANYRES32=r4, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000021900700000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="000000007f0000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00u\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000400)=""/4096) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) socket$isdn_base(0x22, 0x3, 0x0) 10:42:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x14) 10:42:55 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x3, 0x9, 0x1, {0xb, @vbi={0x0, 0x7c}}}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)) 10:42:55 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xd8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:55 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x15) 10:42:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3362.376695] usb usb9: usbfs: process 21546 (syz-executor5) did not claim interface 0 before use [ 3362.441545] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) [ 3362.523906] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:55 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:55 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xd9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3362.738719] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3362.778983] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:56 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x140, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x2000000000, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000000)={0x5, 0x41, 0x122, 0x100}) r5 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x0, 0x400400) sendmsg$alg(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000640)="628671435790a82a4ddb5fbb0bdf62a709916f146370a6ecc13cee67a93d6a0f5226c536dde403337d95294394a86faaff37c03561727dd124418ea0057e50b69a58d9125237f582eade7b0f7f5293cc7ac2eedf8c33a20816dd6309bf52555e4bcc5d7ee4475e68799dcbde9a989f32e22b3b36e5f82fd8006f29abc6a72b019b85fd1fb9851693a92f9a71eade33b40a9fb0b5d93d895e1ae182b7c5b76da18a1ef4db2236bacd56e5772ae4cecc507614dc8a92c599fee07f70681decac9ba6a55bd0905b7cedd9ab3f9d0f", 0xcd}], 0x1, 0x0, 0x0, 0x10}, 0x4000010) r6 = gettid() syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10091}, 0xc, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="0000000002000000001c97d7c80000000000000000000400d55b41398aa5c83ce4ce0e046b8227c9ec"], 0x1}, 0x1, 0x0, 0x0, 0x1ffffffe}, 0x40000) getgid() writev(r1, &(0x7f0000000500)=[{&(0x7f0000000480)="2b1cbccc40004dd548226dbf7865af0dc9725484e5699dfe9f02d29fd620910b60499e1aaf7d636cf32399ed1ff8ec7e26c9", 0x32}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) ioprio_get$pid(0x2, r6) timer_settime(0x0, 0x100000000000001, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000040)) tkill(r6, 0x1004000000016) fgetxattr(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="620a1f000000ffa06cb3b00010000000000000f7043c59a930b67ca357a8c01a96a10e2a7e8097d58a00000000000000dc191518d7f0b92663dafcbd22640000000000e3a7b19d84f471526d337fd2f0845ecfbb621146f1a5169ca12ce3fbb86b0000000000000000000000"], 0x0, 0x0) close(r4) dup2(r3, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f00000007c0)={[{0x7, 0x3, 0x3, 0xe2fe, 0xffffffffffffff81, 0x4, 0x4, 0xffffffffffffb1b0, 0x10000, 0x0, 0x3, 0x2}, {0x716, 0x7, 0x8, 0x8, 0x0, 0x800, 0x2, 0x4, 0x1, 0x0, 0x2, 0x6b74, 0x8000}, {0x1, 0x0, 0x1406, 0xea7, 0x5, 0x20, 0x4, 0x1, 0x80000001, 0x81, 0x8245, 0x0, 0x2}]}) r8 = dup3(0xffffffffffffffff, r2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r8, &(0x7f0000000100)={0x80000000}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x15, 0x2, 0x88, 0x100007000000000, 0x1, r5, 0x4}, 0x2c) timer_delete(r7) 10:42:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x16) 10:42:56 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:56 executing program 1: r0 = memfd_create(&(0x7f0000000380)='/dev/dsp\x00', 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000280)='illinois\x00', 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 10:42:56 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xda, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3363.060754] usb usb9: usbfs: process 21546 (syz-executor5) did not claim interface 0 before use [ 3363.195205] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3363.205015] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:42:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:56 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xdb, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3363.251764] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:56 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xc}, @exit], &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 10:42:56 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xdc, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x17) [ 3363.558611] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000001180)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000011c0)={{0x3, 0x3, 0x9, 0x0, 0x1f}}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x7}, 0x8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000080)=0xffffffffffffffff) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x1a}) socket$packet(0x11, 0x3, 0x300) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, 0x0) getdents64(r4, &(0x7f0000000340)=""/57, 0x252) socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:42:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000006040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8000) 10:42:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xdd, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x18) [ 3366.326155] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xde, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3366.373866] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:59 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000080)='./file0\x00', 0x8) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000c40)={{}, {}, [{0x2, 0x1}, {0x2, 0x3}, {0x2, 0x4}, {0x2, 0x1}], {0x4, 0x7}, [{0x8, 0x3}, {0x8, 0x4}, {0x8, 0x5}], {0x10, 0x4}, {0x20, 0x1}}, 0x5c, 0x2) renameat(r0, &(0x7f0000000240)='.//ile0\x00', r0, &(0x7f00000007c0)='./file0/f.le.\x00') 10:42:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xdf, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x19) [ 3366.606757] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:42:59 executing program 5: 10:42:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:42:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xe0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:42:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1a) 10:43:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3366.930197] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xe1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:00 executing program 5: [ 3367.051848] overlayfs: filesystem on './file0' not supported as upperdir [ 3367.128782] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:00 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000180)) mkdir(&(0x7f0000000080)='./file0\x00', 0x8) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000c40)={{}, {}, [{0x2, 0x1}, {0x2, 0x3}, {0x2, 0x4}, {0x2, 0x1}], {0x4, 0x7}, [{0x8, 0x3}, {0x8, 0x4}, {0x8, 0x5}], {0x10, 0x4}, {0x20, 0x1}}, 0x5c, 0x2) renameat(r0, &(0x7f0000000240)='.//ile0\x00', r0, &(0x7f00000007c0)='./file0/f.le.\x00') 10:43:00 executing program 5: 10:43:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1b) 10:43:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xe2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3367.192699] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3367.373229] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:00 executing program 5: 10:43:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xe3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:00 executing program 5: 10:43:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3367.612839] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3367.644018] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:00 executing program 1: 10:43:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1c) 10:43:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xe4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000003f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:00 executing program 5: 10:43:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:01 executing program 5: [ 3367.989938] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xe5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:01 executing program 5: [ 3368.087558] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:01 executing program 1: 10:43:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1d) 10:43:01 executing program 1: 10:43:01 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:01 executing program 5: 10:43:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xe6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:01 executing program 1: sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x6e, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f0000000ac0)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000880)=""/186, 0xba}, {0x0}], 0x4, 0x400000000000) [ 3368.420815] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1e) 10:43:01 executing program 5: r0 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) keyctl$link(0x8, r0, r0) [ 3368.503413] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:01 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:01 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x1, @pix={0x0, 0x0, 0x0, 0x2}}) 10:43:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xe7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3368.676721] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:01 executing program 1: sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x6e, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f0000000ac0)=[{0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000880)=""/186, 0xba}, {0x0}], 0x4, 0x400000000000) [ 3368.757572] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x26) 10:43:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x0) 10:43:01 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xe8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3368.962848] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:02 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3369.012653] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180080000000000020002e41583060eff99800000000000095"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x41}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000180)="0494c15815656fc30b46588f51d2", 0x0, 0xc5d}, 0x28) 10:43:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x29) 10:43:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000001580)={0x6, 0x992, &(0x7f0000001400)="6038427b1fcb2bb34542d48157ac899b61ffaa306206596737072b45853ea713db8e943b1af5cdcda3f8ce48dcb010c25e0974929c4b74e599fabe19b386e082bcdf946c72d67fce0107fd312d0849d4c4f929a159f9b5f5ec63b070e500bb519291924b10ca3ec723", 0x0, 0x69}) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) mq_notify(r4, &(0x7f00000000c0)={0x0, 0x2861c2e6, 0x2, @thr={&(0x7f0000000140)="47fc5d70edbc6021da3ec0cbbb2aa768283560a8285dbfad71344ca71145874d036df39626de6112cbf244857c0bace9f631abf24f0ed2ef669370f96fbe0f2858912e81ab4b330d3a62712ddacfa731384a194836a36f3ba6a5ab9655740d8d92780e376db2a9016c2f682671bfe12f44dd91cd795276ba1a1f37172b5a83eaa818c3f17e5eb22db79336ce2e5d", 0x0}}) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="d00000000000000081000000000000000500000000000000", @ANYRES32=r4, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000021900700000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="000000007f0000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00u\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000400)=""/4096) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) socket$isdn_base(0x22, 0x3, 0x0) 10:43:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xe9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3369.197450] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3369.306023] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xd, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xea, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:02 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3369.419985] usb usb9: usbfs: process 21912 (syz-executor1) did not claim interface 0 before use 10:43:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x2e) 10:43:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000001580)={0x6, 0x992, &(0x7f0000001400)="6038427b1fcb2bb34542d48157ac899b61ffaa306206596737072b45853ea713db8e943b1af5cdcda3f8ce48dcb010c25e0974929c4b74e599fabe19b386e082bcdf946c72d67fce0107fd312d0849d4c4f929a159f9b5f5ec63b070e500bb519291924b10ca3ec723", 0x0, 0x69}) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) mq_notify(r4, &(0x7f00000000c0)={0x0, 0x2861c2e6, 0x2, @thr={&(0x7f0000000140)="47fc5d70edbc6021da3ec0cbbb2aa768283560a8285dbfad71344ca71145874d036df39626de6112cbf244857c0bace9f631abf24f0ed2ef669370f96fbe0f2858912e81ab4b330d3a62712ddacfa731384a194836a36f3ba6a5ab9655740d8d92780e376db2a9016c2f682671bfe12f44dd91cd795276ba1a1f37172b5a83eaa818c3f17e5eb22db79336ce2e5d", 0x0}}) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="d00000000000000081000000000000000500000000000000", @ANYRES32=r4, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000021900700000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="000000007f0000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00u\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000400)=""/4096) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) socket$isdn_base(0x22, 0x3, 0x0) [ 3369.539636] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:02 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xeb, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:02 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x180) accept4$unix(r1, &(0x7f0000000340)=@abs, &(0x7f00000003c0)=0x6e, 0x80000) mkdirat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x1ff) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x8, @remote, 0x800}}, 0x4000000000, 0x8}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={r2, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}, 0x100}, &(0x7f0000000200)=0x90) fcntl$dupfd(r0, 0x3a152c4fba2bac01, r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000240)={'rridge0\x00\x00\x00\xfe\xff\x00', &(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES16=r3, @ANYRESHEX=r3]]}) 10:43:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xe, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3369.695292] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3369.745881] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x36) 10:43:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xec, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:02 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xf, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3369.851131] usb usb9: usbfs: process 21954 (syz-executor1) did not claim interface 0 before use [ 3369.937972] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3369.977138] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000001580)={0x6, 0x992, &(0x7f0000001400)="6038427b1fcb2bb34542d48157ac899b61ffaa306206596737072b45853ea713db8e943b1af5cdcda3f8ce48dcb010c25e0974929c4b74e599fabe19b386e082bcdf946c72d67fce0107fd312d0849d4c4f929a159f9b5f5ec63b070e500bb519291924b10ca3ec723", 0x0, 0x69}) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) mq_notify(r4, &(0x7f00000000c0)={0x0, 0x2861c2e6, 0x2, @thr={&(0x7f0000000140)="47fc5d70edbc6021da3ec0cbbb2aa768283560a8285dbfad71344ca71145874d036df39626de6112cbf244857c0bace9f631abf24f0ed2ef669370f96fbe0f2858912e81ab4b330d3a62712ddacfa731384a194836a36f3ba6a5ab9655740d8d92780e376db2a9016c2f682671bfe12f44dd91cd795276ba1a1f37172b5a83eaa818c3f17e5eb22db79336ce2e5d", 0x0}}) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="d00000000000000081000000000000000500000000000000", @ANYRES32=r4, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000021900700000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="000000007f0000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00u\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000400)=""/4096) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) socket$isdn_base(0x22, 0x3, 0x0) 10:43:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xed, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:03 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x10, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x3e) 10:43:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = shmget$private(0x0, 0x4000, 0x82, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000180)=""/214) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) ioctl$TIOCNXCL(r3, 0x540d) r4 = gettid() ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f00000000c0)=r4) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xc2) recvmmsg(r1, &(0x7f0000006240)=[{{0x0, 0x0, &(0x7f0000005040)=[{&(0x7f0000004d80)=""/140, 0xbd}, {&(0x7f0000004fc0)=""/109, 0x6d}], 0x2}}], 0x1, 0x0, 0x0) 10:43:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xee, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3370.213145] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:03 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x11, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3370.278990] usb usb9: usbfs: process 22000 (syz-executor1) did not claim interface 0 before use 10:43:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='/dev/ppp\x00', 0x2) linkat(r1, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0x1400) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYBLOB="d650eca88487ede60950f137150800000b0000001700bdd626f378703b821c6491c8b76687b521685dd7c0c19497c63b669513813f6a6a5694cd379cddfc6eb282000000000000000000000000000000"], 0x0) r2 = dup2(r0, r0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000a80)=ANY=[@ANYBLOB="ffffff7f0000000002004e2400000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000002000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e200000000000000000000000000000000000001700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x210) r3 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e27, @multicast2}, 0x10) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) pipe(&(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x100400001, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000340)) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, 0x0) poll(0x0, 0x0, 0x3) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) setsockopt$inet_mreqsrc(r3, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) setxattr$security_smack_transmute(&(0x7f0000000080)='./file1\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{&(0x7f0000000500)=@pppol2tpv3, 0x80, &(0x7f0000000a40)=[{0x0}, {&(0x7f00000008c0)=""/108, 0x6c}], 0x2}}], 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000300)=0x9, 0x4) clone(0x10802000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 10:43:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xef, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000001580)={0x6, 0x992, &(0x7f0000001400)="6038427b1fcb2bb34542d48157ac899b61ffaa306206596737072b45853ea713db8e943b1af5cdcda3f8ce48dcb010c25e0974929c4b74e599fabe19b386e082bcdf946c72d67fce0107fd312d0849d4c4f929a159f9b5f5ec63b070e500bb519291924b10ca3ec723", 0x0, 0x69}) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) mq_notify(r4, &(0x7f00000000c0)={0x0, 0x2861c2e6, 0x2, @thr={&(0x7f0000000140)="47fc5d70edbc6021da3ec0cbbb2aa768283560a8285dbfad71344ca71145874d036df39626de6112cbf244857c0bace9f631abf24f0ed2ef669370f96fbe0f2858912e81ab4b330d3a62712ddacfa731384a194836a36f3ba6a5ab9655740d8d92780e376db2a9016c2f682671bfe12f44dd91cd795276ba1a1f37172b5a83eaa818c3f17e5eb22db79336ce2e5d", 0x0}}) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="d00000000000000081000000000000000500000000000000", @ANYRES32=r4, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000021900700000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="000000007f0000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00u\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000400)=""/4096) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 10:43:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x4f) [ 3370.444565] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x12, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3370.516045] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xf0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3370.590653] usb usb9: usbfs: process 22049 (syz-executor1) did not claim interface 0 before use 10:43:03 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000003f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x64) 10:43:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x13, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xf1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000001580)={0x6, 0x992, &(0x7f0000001400)="6038427b1fcb2bb34542d48157ac899b61ffaa306206596737072b45853ea713db8e943b1af5cdcda3f8ce48dcb010c25e0974929c4b74e599fabe19b386e082bcdf946c72d67fce0107fd312d0849d4c4f929a159f9b5f5ec63b070e500bb519291924b10ca3ec723", 0x0, 0x69}) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) mq_notify(r4, &(0x7f00000000c0)={0x0, 0x2861c2e6, 0x2, @thr={&(0x7f0000000140)="47fc5d70edbc6021da3ec0cbbb2aa768283560a8285dbfad71344ca71145874d036df39626de6112cbf244857c0bace9f631abf24f0ed2ef669370f96fbe0f2858912e81ab4b330d3a62712ddacfa731384a194836a36f3ba6a5ab9655740d8d92780e376db2a9016c2f682671bfe12f44dd91cd795276ba1a1f37172b5a83eaa818c3f17e5eb22db79336ce2e5d", 0x0}}) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="d00000000000000081000000000000000500000000000000", @ANYRES32=r4, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000021900700000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="000000007f0000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00u\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000400)=""/4096) [ 3370.770095] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:03 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3370.816672] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3370.999064] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3371.029066] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3371.049588] usb usb9: usbfs: process 22092 (syz-executor1) did not claim interface 0 before use 10:43:04 executing program 5: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000006c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000000c0)) ioctl$TIOCLINUX2(r1, 0x541c, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000400)=ANY=[@ANYBLOB="62726f7574650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aa000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000068339465eb4a0d7c8ab184505ac9c5d767395b03979a8028bbdddb1602c2a5b9e7192e052b1aabd6eb8e", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xe8) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x67, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@initdev, @in6}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@loopback}}, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000340)={0x0, @bt={0x0, 0x0, 0x1, 0x1, 0x3dc, 0x7, 0x6, 0x2, 0x52, 0x3f, 0x1000, 0x7f, 0x0, 0xa4, 0x8, 0x3}}) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r2 = semget(0xffffffffffffffff, 0x2, 0x0) semctl$IPC_INFO(r2, 0x0, 0x3, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:43:04 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000001580)={0x6, 0x992, &(0x7f0000001400)="6038427b1fcb2bb34542d48157ac899b61ffaa306206596737072b45853ea713db8e943b1af5cdcda3f8ce48dcb010c25e0974929c4b74e599fabe19b386e082bcdf946c72d67fce0107fd312d0849d4c4f929a159f9b5f5ec63b070e500bb519291924b10ca3ec723", 0x0, 0x69}) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) mq_notify(r4, &(0x7f00000000c0)={0x0, 0x2861c2e6, 0x2, @thr={&(0x7f0000000140)="47fc5d70edbc6021da3ec0cbbb2aa768283560a8285dbfad71344ca71145874d036df39626de6112cbf244857c0bace9f631abf24f0ed2ef669370f96fbe0f2858912e81ab4b330d3a62712ddacfa731384a194836a36f3ba6a5ab9655740d8d92780e376db2a9016c2f682671bfe12f44dd91cd795276ba1a1f37172b5a83eaa818c3f17e5eb22db79336ce2e5d", 0x0}}) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="d00000000000000081000000000000000500000000000000", @ANYRES32=r4, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000021900700000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="000000007f0000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00u\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') 10:43:04 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xf2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x14, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x65) [ 3371.261302] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:04 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xf3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3371.331459] usb usb9: usbfs: process 22117 (syz-executor1) did not claim interface 0 before use [ 3371.363532] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x15, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000001580)={0x6, 0x992, &(0x7f0000001400)="6038427b1fcb2bb34542d48157ac899b61ffaa306206596737072b45853ea713db8e943b1af5cdcda3f8ce48dcb010c25e0974929c4b74e599fabe19b386e082bcdf946c72d67fce0107fd312d0849d4c4f929a159f9b5f5ec63b070e500bb519291924b10ca3ec723", 0x0, 0x69}) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) mq_notify(r4, &(0x7f00000000c0)={0x0, 0x2861c2e6, 0x2, @thr={&(0x7f0000000140)="47fc5d70edbc6021da3ec0cbbb2aa768283560a8285dbfad71344ca71145874d036df39626de6112cbf244857c0bace9f631abf24f0ed2ef669370f96fbe0f2858912e81ab4b330d3a62712ddacfa731384a194836a36f3ba6a5ab9655740d8d92780e376db2a9016c2f682671bfe12f44dd91cd795276ba1a1f37172b5a83eaa818c3f17e5eb22db79336ce2e5d", 0x0}}) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="d00000000000000081000000000000000500000000000000", @ANYRES32=r4, @ANYBLOB="00000000040000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000021900700000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="000000007f0000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00u\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 10:43:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x66) 10:43:04 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:04 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xf4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3371.661161] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3371.695197] usb usb9: usbfs: process 22144 (syz-executor1) did not claim interface 0 before use [ 3371.711977] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:05 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={0x0}}, 0x80) mlockall(0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, 0x0) mmap(&(0x7f0000428000/0x2000)=nil, 0x2000, 0x0, 0x8032, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000140), &(0x7f0000000200)=0x4) readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x100a}], 0x1) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, 0x0) 10:43:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:05 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xf5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:05 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000001580)={0x6, 0x992, &(0x7f0000001400)="6038427b1fcb2bb34542d48157ac899b61ffaa306206596737072b45853ea713db8e943b1af5cdcda3f8ce48dcb010c25e0974929c4b74e599fabe19b386e082bcdf946c72d67fce0107fd312d0849d4c4f929a159f9b5f5ec63b070e500bb519291924b10ca3ec723", 0x0, 0x69}) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) mq_notify(r4, &(0x7f00000000c0)={0x0, 0x2861c2e6, 0x2, @thr={&(0x7f0000000140)="47fc5d70edbc6021da3ec0cbbb2aa768283560a8285dbfad71344ca71145874d036df39626de6112cbf244857c0bace9f631abf24f0ed2ef669370f96fbe0f2858912e81ab4b330d3a62712ddacfa731384a194836a36f3ba6a5ab9655740d8d92780e376db2a9016c2f682671bfe12f44dd91cd795276ba1a1f37172b5a83eaa818c3f17e5eb22db79336ce2e5d", 0x0}}) 10:43:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x67) [ 3372.392684] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:05 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x17, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:05 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xf6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3372.494958] usb usb9: usbfs: process 22182 (syz-executor1) did not claim interface 0 before use 10:43:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x300) [ 3372.665514] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:05 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xf7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000001580)={0x6, 0x992, &(0x7f0000001400)="6038427b1fcb2bb34542d48157ac899b61ffaa306206596737072b45853ea713db8e943b1af5cdcda3f8ce48dcb010c25e0974929c4b74e599fabe19b386e082bcdf946c72d67fce0107fd312d0849d4c4f929a159f9b5f5ec63b070e500bb519291924b10ca3ec723", 0x0, 0x69}) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3372.747575] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000080011000}, 0xfffffffffffffc1d, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="000028bd863fec51f12504000000"], 0x18}, 0x1, 0x0, 0x0, 0x4004}, 0x41) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x501202, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) writev(r0, &(0x7f0000000000), 0x0) fchdir(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x13f, 0xd}}, 0x20) 10:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x18, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x3e8) 10:43:06 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:06 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xf8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3372.985974] usb usb9: usbfs: process 22214 (syz-executor1) did not claim interface 0 before use 10:43:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:06 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xf9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3373.128449] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:06 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x19, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:06 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@remote}, &(0x7f00000000c0)=0x14) sendmsg$can_raw(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x8045) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000000), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x7ff, 0x40, 0x3f, 0xfffffffffffffffb, 0x0, 0x1360, 0x2000, 0x2, 0xb6, 0x5, 0x2c54, 0x5, 0xffffffffffff4f66, 0x401, 0x800, 0x8, 0x55, 0x1, 0x7, 0x7ff, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x101, 0x800, 0x80000001, 0x0, 0x3f, 0x0, 0xffe000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}, 0x80, 0x7, 0x9, 0x7, 0x68dd, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000140)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x06\x00\xdc\r') openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x03N\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'memory'}]}, 0x8) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x6, @local, 'bridge0\x00'}}, 0x1e) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000100)=0x15000) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x3}, 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40400, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x10) 10:43:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x480) [ 3373.387956] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:06 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xfa, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3373.429161] usb usb9: usbfs: process 22262 (syz-executor1) did not claim interface 0 before use [ 3373.449634] device lo entered promiscuous mode 10:43:06 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:06 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xfb, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x500) 10:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3373.779822] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3373.805326] device lo left promiscuous mode 10:43:06 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xfc, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:07 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3374.111601] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001600)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) sendmsg$kcm(r2, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008ac0)={0x0, 0x0, 0x0, 0x0}, 0x48) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) removexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@known='trusted.overlay.metacopy\x00') socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x8080) recvmsg(r1, &(0x7f0000000340)={&(0x7f00000004c0)=@ax25={{0x3, @null}, [@null, @default, @default, @remote, @rose, @null, @rose, @rose]}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/105, 0x69}], 0x26a, &(0x7f0000000980)=""/72, 0xffffffffffffff84}, 0x40000040) socket$kcm(0x2, 0x0, 0x2) socket$kcm(0x29, 0x0, 0x0) 10:43:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:07 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xfd, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:07 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000000000000000003f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x600) 10:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3374.653085] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:07 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xfe, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:07 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x700) [ 3374.926373] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:08 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x102, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f000000afc0)=[{{0x0, 0x0, &(0x7f0000006940)=[{0x0}], 0x37c, 0x0, 0x8}}], 0x400000000000293, 0x0, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3375.275247] usb usb9: usbfs: process 22378 (syz-executor1) did not claim interface 0 before use 10:43:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001600)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) sendmsg$kcm(r2, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008ac0)={0x0, 0x0, 0x0, 0x0}, 0x48) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) removexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@known='trusted.overlay.metacopy\x00') socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x8080) recvmsg(r1, &(0x7f0000000340)={&(0x7f00000004c0)=@ax25={{0x3, @null}, [@null, @default, @default, @remote, @rose, @null, @rose, @rose]}, 0x80, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/105, 0x69}], 0x26a, &(0x7f0000000980)=""/72, 0xffffffffffffff84}, 0x40000040) socket$kcm(0x2, 0x0, 0x2) socket$kcm(0x29, 0x0, 0x0) 10:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:08 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x900) 10:43:08 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x103, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3375.582906] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:08 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x104, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:08 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x21, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3375.676981] usb usb9: usbfs: process 22405 (syz-executor1) did not claim interface 0 before use 10:43:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xa00) [ 3375.857475] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:08 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x105, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r2) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3376.107366] usb usb9: usbfs: process 22437 (syz-executor1) did not claim interface 0 before use 10:43:09 executing program 5: setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value, 0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) 10:43:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x22, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:09 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:09 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x106, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xb00) 10:43:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:09 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x107, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3376.555562] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3376.585928] usb usb9: usbfs: process 22459 (syz-executor1) did not claim interface 0 before use 10:43:09 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:09 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) futex(&(0x7f0000000880), 0x9, 0x0, &(0x7f00000008c0)={0x0, 0x1c9c380}, &(0x7f0000000900)=0x2, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)=0x9) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x0, 0x6d, 0x20000000000014, 0x0, 0x0}, 0x1db) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="00b47edb064827b56ce305640e52"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x8000) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000003c0)={0x84, @local, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x20000000000, 0x0, 0x800}, 0x2c) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x16, 0x8, "9b93d7a7e4fb39daab332f2646ffb445fad3e6c64c7d19642a6510b05534a93dd1a7783832ccacc5a22e5745656880afdcaa3e913561c539a8dd796454a735b0", "46e63151428224c434353aedc66eb25afeb82377b1c529267d29919b97a34529", [0x9, 0x3f]}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x6, 0x9}, &(0x7f0000000380)=0x10) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xe0, r7, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xa26}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100000000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10000}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000045) poll(&(0x7f0000000440)=[{r5}, {r8, 0x4208}, {r0, 0x401}, {r3, 0x2}, {r6, 0x109}], 0x5, 0x3ff) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x1, 0x0, &(0x7f0000000140)="14"}) mmap$binder(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0xc1010, r2, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000000)=[@transaction={0x40406300, {0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f00000005c0), &(0x7f0000000600)=[0x48, 0x45c2fd6a264ae34a, 0x28, 0x38]}}], 0x0, 0x0, &(0x7f0000000300)}) mlock(&(0x7f0000001000/0x3000)=nil, 0x3000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') ioctl$SIOCX25SCUDMATCHLEN(r8, 0x89e7, &(0x7f0000000780)={0x7f}) fsetxattr$security_selinux(r2, &(0x7f0000000980)='security.selinux\x00', &(0x7f00000009c0)='system_u:object_r:vmware_device_t:s0\x00', 0x25, 0x1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x7, 0x101000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x64, 0x5, {"464202afd9d101064e49a9d038291249e2bdea44c5265c3ac4534bded4885e6f23330b35a81642e844e6aa771303f8b80ddbcf21ad3ebb8e359d5baeb10640bac53b1214ba385024b81efae3"}}, {0x0, "915d192e4015f668ca23e7bb6fb68df4b9879bd65b062e5750f8a6170476bf16dd7dd925c5643a9c54ad847f6c6084941c6506e87e9c746a4e65b2654cb70a01343e77c3b119540090781fd610b17d47c3092aad866d2ea01356e08a06641c580e6e364f39844f689faad1e829e75d488fad9eccbeae25f2"}}, 0x0, 0xde}, 0x20) 10:43:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x23, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:09 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x108, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xc00) [ 3376.842675] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3376.946681] usb usb9: usbfs: process 22487 (syz-executor1) did not claim interface 0 before use 10:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x24, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x9) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:10 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3377.019111] binder: 22473:22493 got transaction with invalid offset (72, min 0 max 0) or object. [ 3377.052833] binder: 22473:22493 transaction failed 29201/-22, size 0-32 line 3097 10:43:10 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x109, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3377.190851] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x25, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3377.234664] usb usb9: usbfs: process 22511 (syz-executor1) did not claim interface 0 before use 10:43:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xd00) 10:43:10 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3377.454791] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3377.633938] binder: BINDER_SET_CONTEXT_MGR already set [ 3377.639952] binder: 22473:22494 ioctl 40046207 0 returned -16 [ 3377.652682] binder_alloc: 22473: binder_alloc_buf, no vma [ 3377.658893] binder: 22473:22493 transaction failed 29189/-3, size 0-32 line 3035 [ 3377.659232] binder: undelivered TRANSACTION_ERROR: 29201 10:43:10 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f02feef283c123f31") syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x3b, &(0x7f0000000240)=0xffff, 0x4) fchdir(r2) r3 = open(&(0x7f0000000200)='./bus\x00', 0x42042, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000640)=""/4096) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000380)=0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000400)="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", 0x200) sendfile(r5, r6, 0x0, 0x10000) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000600)=0x1e) 10:43:10 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x10a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x26, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000080806, 0x100000000000008) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:10 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xe00) [ 3377.725891] binder: undelivered TRANSACTION_ERROR: 29189 [ 3377.801843] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:10 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x10b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3377.858706] usb usb9: usbfs: process 22554 (syz-executor1) did not claim interface 0 before use 10:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x27, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:11 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x40000080806, 0x100000000000008) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xf00) [ 3378.071384] audit: type=1800 audit(1547980991.107:879): pid=22563 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=17185 res=0 [ 3378.207595] audit: type=1804 audit(1547980991.117:880): pid=22563 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir695391518/syzkaller.ajz82f/574/file0" dev="sda1" ino=17185 res=1 10:43:11 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x10c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3378.756935] audit: type=1804 audit(1547980991.797:881): pid=22589 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir695391518/syzkaller.ajz82f/574/file0" dev="sda1" ino=17185 res=1 [ 3378.943472] audit: type=1804 audit(1547980991.937:882): pid=22589 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir695391518/syzkaller.ajz82f/574/file0" dev="sda1" ino=17185 res=1 10:43:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1100) 10:43:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x40000080806, 0x100000000000008) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x28, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:12 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x10d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:12 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) readahead(r0, 0x6, 0x6) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000080)={0x100000000, 0x2, 0x3, 0x2, 0x80000000, 0xfffffffffffffffd, 0x2}) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000100)={0x1, "8f0a133bef35e14653e66d51a88ff115e9816b99d92e4976b4aa93526ea4bd4c", 0x800, 0x0, 0x0, 0x4, 0x8000000000000000}) 10:43:12 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x10e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3379.187402] usb usb9: usbfs: process 22608 (syz-executor1) did not claim interface 0 before use 10:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x29, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3379.430979] usb usb9: usbfs: process 22623 (syz-executor1) did not claim interface 0 before use 10:43:12 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:12 executing program 5: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) fcntl$setstatus(r1, 0x4, 0x219ccad2ef1fc8b) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 10:43:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1200) 10:43:12 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x10f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:12 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3379.643433] usb usb9: usbfs: process 22635 (syz-executor1) did not claim interface 0 before use 10:43:12 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x110, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:12 executing program 5: syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6, 0x8400) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x8000, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000001400)=@ipx, 0x1, 0x0, 0x0, 0x0, 0x5ff6b9832020712c}, 0x4000}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='sessionid\x00') preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 10:43:12 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1300) [ 3379.934556] usb usb9: usbfs: process 22652 (syz-executor1) did not claim interface 0 before use 10:43:13 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::d:0.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x40, 0xad58, 0x5}) [ 3380.121034] libceph: resolve 'd' (ret=-3): failed [ 3380.151849] libceph: parse_ips bad ip '[d::d:0.,[' [ 3380.154518] libceph: resolve 'd' (ret=-3): failed [ 3380.163036] libceph: parse_ips bad ip '[d::d:0.,[' [ 3380.180354] IPVS: ftp: loaded support on port[0] = 21 [ 3380.264848] device bridge_slave_1 left promiscuous mode [ 3380.270364] bridge0: port 2(bridge_slave_1) entered disabled state [ 3380.306317] device bridge_slave_0 left promiscuous mode [ 3380.311778] bridge0: port 1(bridge_slave_0) entered disabled state [ 3380.461637] device hsr_slave_1 left promiscuous mode [ 3380.527913] device hsr_slave_0 left promiscuous mode [ 3380.581278] team0 (unregistering): Port device team_slave_1 removed [ 3380.592650] team0 (unregistering): Port device team_slave_0 removed [ 3380.605876] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3380.641291] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3380.720956] bond0 (unregistering): Released all slaves [ 3380.883462] chnl_net:caif_netlink_parms(): no params data found [ 3380.924465] bridge0: port 1(bridge_slave_0) entered blocking state [ 3380.930964] bridge0: port 1(bridge_slave_0) entered disabled state [ 3380.938664] device bridge_slave_0 entered promiscuous mode [ 3380.946303] bridge0: port 2(bridge_slave_1) entered blocking state [ 3380.952746] bridge0: port 2(bridge_slave_1) entered disabled state [ 3380.960168] device bridge_slave_1 entered promiscuous mode [ 3380.981824] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3380.991534] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3381.013877] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3381.021531] team0: Port device team_slave_0 added [ 3381.027470] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3381.035400] team0: Port device team_slave_1 added [ 3381.040930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3381.048535] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3381.127960] device hsr_slave_0 entered promiscuous mode [ 3381.164716] device hsr_slave_1 entered promiscuous mode [ 3381.232028] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3381.239256] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3381.253202] bridge0: port 2(bridge_slave_1) entered blocking state [ 3381.259652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3381.266275] bridge0: port 1(bridge_slave_0) entered blocking state [ 3381.272603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3381.349972] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3381.359565] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3381.371714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3381.380230] bridge0: port 1(bridge_slave_0) entered disabled state [ 3381.387791] bridge0: port 2(bridge_slave_1) entered disabled state [ 3381.411596] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3381.419395] 8021q: adding VLAN 0 to HW filter on device team0 [ 3381.430265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3381.438770] bridge0: port 1(bridge_slave_0) entered blocking state [ 3381.445186] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3381.469578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3381.478520] bridge0: port 2(bridge_slave_1) entered blocking state [ 3381.484932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3381.503273] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3381.523844] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3381.544929] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3381.565272] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3381.572800] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3381.585222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3381.592941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3381.610606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3381.629831] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3381.648334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3381.671513] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3381.771418] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3381.792677] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:14 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:14 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x111, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:14 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0xb8, 0x44000) r0 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x8800) r1 = openat$cgroup_ro(r0, &(0x7f0000000400)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\x04KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88\xae|\b\xca\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v\x0e\xc2F\x82\x9b\xe2U\x0fb=\xbe$\xc5\x9c\x01H\x13\x9ej5|\x00\x00\x00', 0x2761, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xac, 0x11, 0x104, 0x70bd2c, 0x25dfdbfc, {0x1d}, [@generic="ba7786f4b02a79024216d2b9fd0b72f704be314fa2199591e04f038c0b0ffd6672b08b4b3cadaacf5dba2691e7f8eab7c7a3a825fccac44591cfb7209556c855643820ca570f31a6983980b56db9f5ccbc416ee9a08e4a73df8c440fb28595559d9a1652e7cc5c910bd1e451bff533731eadbcdec1925e2e09346b5f3d94be0e827cfd0b45590b70cbdf5b0f4f767be9ba4ee04ac55e5d91"]}, 0xac}, 0x1, 0x0, 0x0, 0x40000}, 0x800) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc, 0xb706}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000100)={0x9, 0x6ff3e968}) 10:43:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1400) [ 3381.934759] usb usb9: usbfs: process 22683 (syz-executor1) did not claim interface 0 before use 10:43:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x112, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:15 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3382.049061] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3382.149787] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1500) [ 3382.285920] usb usb9: usbfs: process 22711 (syz-executor1) did not claim interface 0 before use 10:43:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:15 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x113, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:15 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001680)=""/132, 0x84}, {0x0}, {&(0x7f0000001740)=""/155, 0x9b}, {0x0}, {&(0x7f0000001540)=""/102, 0x66}], 0x5, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000300)=""/92, 0x5c}, {&(0x7f0000000080)=""/7, 0x7}, {&(0x7f0000001800)=""/4096, 0x1140}], 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) recvmmsg(r0, &(0x7f00000015c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/34, 0x22}], 0x1}}], 0x1, 0x0, 0x0) ioctl(r0, 0xc2604110, &(0x7f0000000000)) 10:43:15 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x114, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:15 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3382.607409] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1600) 10:43:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x2f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3382.670745] usb usb9: usbfs: process 22736 (syz-executor1) did not claim interface 0 before use 10:43:15 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x2, 0x0, 0xfffffffffffffffe, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa054d00000000ffffffff25fec2541e21ccf67e1d7b5510029e63000000e565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x81, 0x30, 0x9}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e24, 0xfffffffffffffff7, @rand_addr="1c01c3ef6ba08a9ef1a83120bb200e1a", 0x6}}, [0x7, 0x2, 0x2c0626b6, 0x0, 0x7, 0x8, 0x0, 0xffffffff, 0x9, 0xffff, 0xbe, 0x101, 0xfffffffffffffff9, 0xbb]}, &(0x7f0000000200)=0x100) 10:43:15 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3382.851615] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x115, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3382.923442] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004500), 0xe92bd5d83901ac, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='bond_slave_0\x00') 10:43:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x30, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:16 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3383.008422] usb usb9: usbfs: process 22761 (syz-executor1) did not claim interface 0 before use 10:43:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1700) 10:43:16 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x116, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3383.305238] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3383.339139] usb usb9: usbfs: process 22785 (syz-executor1) did not claim interface 0 before use 10:43:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x31, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3383.385678] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:16 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:16 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1800) 10:43:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x117, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3383.646112] usb usb9: usbfs: process 22800 (syz-executor1) did not claim interface 0 before use 10:43:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x32, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3383.751355] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3383.809303] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:17 executing program 5: r0 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x2, &(0x7f0000000000)=""/245) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r2, 0x308, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x26}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000280)={'bcsh0\x00', 0x2, 0x6}) poll(&(0x7f0000000380)=[{r1, 0x9000}], 0x1, 0x6) prctl$PR_MCE_KILL_GET(0x22) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000003c0)={'syzkaller1\x00', {0x2, 0x4e21, @local}}) setxattr$security_evm(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='security.evm\x00', &(0x7f0000000480)=@v1={0x2, "aeee0ea3d1466c4bc7db501e31ec0b79b3b3ae06"}, 0x15, 0x2) r3 = syz_open_procfs(r0, &(0x7f00000004c0)='net\x00') mknod$loop(&(0x7f0000000500)='./file0\x00', 0xca10, 0x1) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000007c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000780)={&(0x7f00000005c0)={0x194, r4, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff2f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0xf4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x801}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x59f5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8fc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x638f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x800}, 0x1) connect$vsock_stream(r3, &(0x7f0000000800)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) clock_gettime(0x0, &(0x7f0000000880)={0x0, 0x0}) utimensat(r3, &(0x7f0000000840)='./file0\x00', &(0x7f00000008c0)={{0x0, 0x7530}, {r5, r6/1000+30000}}, 0x100) bind$rose(r1, &(0x7f0000000900)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, [@bcast, @default, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000940), &(0x7f0000000980)=0x4) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x80000, 0x0) write$P9_ROPEN(r3, &(0x7f0000000a00)={0x18, 0x71, 0x1, {{0x7b94c3fd98a4cfec, 0x1}, 0x6}}, 0x18) ioctl$KVM_ASSIGN_PCI_DEVICE(r7, 0x8040ae69, &(0x7f0000000a40)={0x3, 0x4, 0x7fffffff, 0x1, 0x7}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000ac0)={0x0, 0x7f800000000000}, &(0x7f0000000b00)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000b40)=@assoc_value={r8, 0x10001}, 0x8) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000b80)={0x0}, &(0x7f0000000bc0)=0xc) waitid(0x0, r9, &(0x7f0000000c00), 0x2, &(0x7f0000000c80)) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000d40)={0x1ff, 0x1, 0xf000, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) clock_settime(0x7, &(0x7f0000000d80)={0x0, 0x1c9c380}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000dc0)) setxattr$trusted_overlay_origin(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)='trusted.overlay.origin\x00', &(0x7f0000000f00)='y\x00', 0x2, 0x3) 10:43:17 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:17 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1900) 10:43:17 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x118, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x33, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3384.198717] usb usb9: usbfs: process 22828 (syz-executor1) did not claim interface 0 before use [ 3384.237297] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x34, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:17 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x119, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3384.381867] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1a00) 10:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x35, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3384.465390] usb usb9: usbfs: process 22851 (syz-executor1) did not claim interface 0 before use 10:43:17 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x10080, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) renameat(r0, &(0x7f0000000380)='./file0\x00', r1, &(0x7f00000003c0)='./file0\x00') ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000002c0)={@multicast2, @multicast1, r3}, 0xc) fcntl$getownex(r2, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) rt_sigqueueinfo(0x0, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x0, 0x0, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed"], 0xd6) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x8001) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) write$binfmt_misc(r4, &(0x7f0000000300)={'syz0'}, 0x4) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 10:43:17 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:17 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x11a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3384.770396] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3384.804616] usb usb9: usbfs: process 22872 (syz-executor1) did not claim interface 0 before use 10:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x36, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3384.847153] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1b00) 10:43:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:18 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:18 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x11b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3385.080329] usb usb9: usbfs: process 22891 (syz-executor1) did not claim interface 0 before use 10:43:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x37, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3385.212385] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1c00) [ 3385.296321] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3385.407368] usb usb9: usbfs: process 22912 (syz-executor1) did not claim interface 0 before use 10:43:18 executing program 5: syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x3, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000040)='Q', &(0x7f0000000100)}, 0x20) r1 = request_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='\x00', 0xfffffffffffffffc) r2 = request_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='/dev/video#\x00', 0xfffffffffffffff9) keyctl$link(0x8, r1, r2) 10:43:18 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x11c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:18 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x38, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1d00) 10:43:18 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3385.679091] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3385.714991] usb usb9: usbfs: process 22933 (syz-executor1) did not claim interface 0 before use 10:43:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x39, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:18 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000180)) r1 = gettid() prctl$PR_GET_DUMPABLE(0x3) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000300), &(0x7f0000000340)=0x4) timer_create(0x0, &(0x7f0000066000), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000000)=""/137) set_tid_address(&(0x7f00000000c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x200, 0x0) mq_timedreceive(r3, &(0x7f0000000200)=""/113, 0x71, 0x7, &(0x7f0000000280)={0x77359400}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000380)) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) process_vm_readv(r1, &(0x7f0000000640)=[{&(0x7f0000000580)=""/143, 0x8f}], 0x354, &(0x7f0000001540)=[{&(0x7f0000001400)=""/90, 0x5a}], 0x1, 0x0) tkill(r1, 0x38) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:43:18 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x11d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3385.918360] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:19 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x3a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1e00) [ 3386.181563] usb usb9: usbfs: process 22962 (syz-executor1) did not claim interface 0 before use 10:43:19 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x11e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3386.269616] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3386.351364] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:19 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x3b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:19 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)=ANY=[@ANYBLOB='P']) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100), 0x10000000000001bf, 0x0, 0xffffffffffffffa8}, 0xffffffffffffffff) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x6, 0x80) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000080)={0xe52, 0x1000, 0x1aec80, 0x0, 0x40, 0x1, 0xd0, 0x401, 0x5e97, 0x6, 0x80000001, 0x209, 0x0, 0x5, 0x2, 0x6, 0x7, 0x3, 0x5}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000000)=',vboxnet1:posix_acl_accessem1\x00') 10:43:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x2600) 10:43:19 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x11f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3386.628806] usb usb9: usbfs: process 22986 (syz-executor1) did not claim interface 0 before use [ 3386.699400] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3386.776481] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x400001) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x0, 0x20}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x1, 0x0, [{0x0, 0x0, 0x0, [], 0x1ff}]}}) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0xd09, &(0x7f0000000080)=0x2) set_robust_list(&(0x7f0000000240)={&(0x7f0000000100), 0x3, &(0x7f0000000200)={&(0x7f0000000180)}}, 0x18) syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@jqfmt_vfsold='jqfmt=vfsold'}], [{@euid_eq={'euid'}}]}) 10:43:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x120, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x3c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3386.955198] usb usb9: usbfs: process 23011 (syz-executor1) did not claim interface 0 before use 10:43:20 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x2900) 10:43:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x121, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3387.262861] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:20 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000000000003f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x3d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3387.375538] usb usb9: usbfs: process 23031 (syz-executor1) did not claim interface 0 before use 10:43:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x122, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:20 executing program 5: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) r1 = dup2(r0, r0) write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x40000004e1d, 0x0, @ipv4}, 0x1c) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) waitid(0x1, 0x0, &(0x7f0000000500), 0xffffff, &(0x7f0000000780)) utimes(0x0, &(0x7f0000000580)={{0x77359400}, {0x77359400}}) recvfrom$inet6(r1, &(0x7f0000000680)=""/223, 0xdf, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x301000, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg(r0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0) [ 3387.654361] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:20 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x3e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x2e00) 10:43:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x123, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3387.764986] usb usb9: usbfs: process 23058 (syz-executor1) did not claim interface 0 before use 10:43:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3387.928142] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:21 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x41, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x124, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3388.084908] usb usb9: usbfs: process 23084 (syz-executor1) did not claim interface 0 before use 10:43:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3388.186094] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x3600) [ 3388.241387] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x42, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3388.364591] usb usb9: usbfs: process 23102 (syz-executor1) did not claim interface 0 before use 10:43:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x8, &(0x7f0000000440)='n', 0x1) getsockopt$inet_opts(r0, 0x0, 0x400000000000009, 0x0, &(0x7f0000000080)) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x4800) setsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000240)=0x9, 0x4) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0xfffd, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x7, 0x100, 0x20004000000000, 0x1ff, 0x9e8059e19fc832de}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={r3, 0x20, 0x5, 0xfffffffffffffff9}, &(0x7f00000001c0)=0x10) 10:43:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x125, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:21 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x43, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x3e00) [ 3388.685439] usb usb9: usbfs: process 23120 (syz-executor1) did not claim interface 0 before use [ 3388.722081] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x126, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3388.772601] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3388.859143] usb usb9: usbfs: process 23139 (syz-executor1) did not claim interface 0 before use 10:43:22 executing program 5: syz_open_dev$sndtimer(0x0, 0x0, 0x0) r0 = getpid() r1 = creat(&(0x7f0000000100)='./bus\x00', 0xfffffffffffffffd) write$evdev(r1, &(0x7f0000000600)=[{{0x0, 0x7530}, 0x0, 0x0, 0x237}], 0x18) sendfile(r1, r1, &(0x7f00000000c0), 0x20) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000640)) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000001640)={0x0, 0x6}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000002d40)=ANY=[@ANYRES32=0x0, @ANYBLOB="05000a0098de3756df01040000000000000400a6438c80c7590628c7c130dccf70e0015ee4c21871061f"], &(0x7f0000001800)=0x18) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, 0x0, &(0x7f00000018c0)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000001900)={0x0, 0x5b7, 0x20}, &(0x7f0000001940)=0xc) r3 = request_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000001980)='trusted.overlay.opaque\x00', 0xfffffffffffffff8) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000019c0)='.dead\x00', 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, r0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)=""/155, 0x9b}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000680)={@local, @remote, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x4, 0x1, &(0x7f00000001c0)=@raw=[@jmp={0x5, 0x80, 0x0, 0x0, 0x0, 0xd}], &(0x7f0000000140)='GPL\x00', 0x401, 0x96, &(0x7f0000000540)=""/150, 0x40f00, 0x0, [], r4, 0x2}, 0x48) r5 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f0000000500)='y\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f00000006c0)="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", 0x0}, 0x18) userfaultfd(0x80800) syz_mount_image$bfs(&(0x7f0000001840)='bfs\x00', &(0x7f0000001880)='./bus\x00', 0x2, 0x6, &(0x7f0000002c80)=[{&(0x7f0000001a00)="1396efe55d7f99717a0b7f596eb762a13806091b890945d73a40e3f9c925f96f745b6976cacbfce71851553555cdb9e5980095cf94c0ecc9ac78dfb5714a7b187674c8cc5f3f3749153b7bcc646db5fb6530a8ed19d4c91156ead24ac49e8d0141fd412d6c7e65586a45d128b0f48ecad041583969723c5bf2723c15a2ac7dd2aee5b0c3b37ca2b987563e740afa683e", 0x90, 0x1}, {&(0x7f0000001ac0)="0da38bd1d879be3384561e8d695be532b608203802f773f067949db8152080a82eb905f40c074e2a0d1c160c", 0x2c, 0x7}, {&(0x7f0000001b00)="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", 0x1000, 0x4}, {&(0x7f0000002b00)="42405842e6e0c1710eeb6a5681558ea1731c86e5ab64e1", 0x17, 0x58}, {&(0x7f0000002b40)="081f266b761c7153a48e26209cff602ec5c6e704073aa7675014ebf8675554d17bf8e548f1a1d425cb972df31d7ad3dcb770f0e36edd5dbdb118da8751f4a997c41dc74f8cb491c17d6fd4a93e9549bfd5be181531065d7cb4acc162612dd3f38055b94f0099bc9d3e635db410a45692f3d155e7f9bddf8cb44203bbbd92e7ff2a723e202785f936ed47458eafb5fe8740edf87de880b651420b", 0x9a, 0x401}, {&(0x7f0000002c00)="a4151a5278102ff1f432914dfd3d0597677171f58886ce6f4ecabf16cce4cf81690c5ee15ca76a69a2055d2d790d6a68bfe6da1569de24d328cf5d00fdb895601a2b6795abad25cdb2512639", 0x4c, 0x9}], 0x10000, 0x0) sendfile(r1, r5, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r2, 0x5}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000002c0), &(0x7f00000017c0)=0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000001740)='IPVS\x00') ptrace$getregs(0xc, r0, 0x5, 0x0) 10:43:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x44, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:22 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x3f00) 10:43:22 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x127, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3389.163435] usb usb9: usbfs: process 23156 (syz-executor1) did not claim interface 0 before use [ 3389.172628] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3389.187094] audit: type=1800 audit(1547981002.227:883): pid=23151 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor5" name="bus" dev="sda1" ino=17810 res=0 [ 3389.264353] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3389.309254] audit: type=1800 audit(1547981002.347:884): pid=23151 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor5" name="bus" dev="sda1" ino=17810 res=0 10:43:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x45, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:22 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x128, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:22 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:22 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x3) r2 = socket$inet6_sctp(0xa, 0x400005, 0x84) sendto$inet6(r2, &(0x7f0000000100)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r4, 0x4004700c, 0x349) r5 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r5, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r5, 0x20000003) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r5, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) write$binfmt_elf64(r7, &(0x7f0000001dc0)=ANY=[@ANYBLOB="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"], 0x9f3) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f00000004c0)=ANY=[@ANYBLOB="a945d4856e0c19889d1a0e5384276411cab760f094e7593054eb472b065e09f70dcdc8f68e93dc2538038984836cabfc4797d0ac5a1a53f13cbd4c869670cacd748c95f16e58a50000000066969e232f408f7632bd8e83c47905f09dfebaec31f0cbe5a5bd0a42ea8802d2558bbaf7a079e9719177c762c2bb73fefe808eca1169ba645923a549564cd4fedc"], 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000a40)={0x2, &(0x7f0000000380)=[{}, {}]}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0x40a85323, &(0x7f0000000000)={{0x6, 0x1f}, 'port0\x00', 0x3, 0x804, 0x7fffffff, 0x0, 0x9, 0x8, 0x8001, 0x0, 0x6, 0x81}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/qat_adf_ctl\x00', 0x44000, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x0, 0x0) mbind(&(0x7f0000126000/0x3000)=nil, 0x3321a8df32ee8487, 0x0, &(0x7f000016e000), 0x5, 0x4) 10:43:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x4000) [ 3389.479987] usb usb9: usbfs: process 23177 (syz-executor1) did not claim interface 0 before use 10:43:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3389.675832] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3389.727933] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:22 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x46, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3389.772675] usb usb9: usbfs: process 23200 (syz-executor1) did not claim interface 0 before use 10:43:22 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x129, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x4f00) [ 3389.959447] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3390.004164] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3390.028222] usb usb9: usbfs: process 23219 (syz-executor1) did not claim interface 0 before use 10:43:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(0x0, 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x47, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:23 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:23 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x12a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3390.313204] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:23 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x20000017, &(0x7f0000000000), 0xfea4) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x20000, 0x0) sendmsg$key(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x120}}, 0x20040014) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x210001) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)=0x9, 0x4) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000240)) lsetxattr$security_smack_transmute(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x1) write$FUSE_LSEEK(r0, &(0x7f0000000440)={0x18, 0xfffffffffffffffe, 0x6, {0xfffffffffffffc00}}, 0x18) 10:43:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x6400) 10:43:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(0x0, 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:23 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x48, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:23 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x12b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3390.702587] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:23 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x12c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(0x0, 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3390.787723] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x49, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x6500) 10:43:23 executing program 5: io_setup(0x1, &(0x7f0000000080)) io_setup(0x8, &(0x7f0000000100)) io_setup(0x58, &(0x7f00000001c0)) io_setup(0x4, &(0x7f0000000240)) io_setup(0x9, &(0x7f0000000280)) creat(&(0x7f0000000000)='./file0\x00', 0x4) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x240000, 0x0) accept$inet(r0, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f0000001380)=0x10) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f00000002c0)={0x3, 0x98, "471579e3f1e01c65222a3ebf76833a7f85d657030f93da4de2566a8ea3868f710b0c9113efff36b6677c4118ff5402a3f2074e4958c6afce18306fe9d0bd9b002e35234fb9a41dfe4f031e605d5e3e006e2d5afeac7225b0e89149ab3be0628188f53502b18d3356dfb87fc8f76a5f6458c408fe84a70e120969662ecadc8b2e3bb879b5dd71aafcba06fcf944d3a6c7c60bb3ce740d4a39"}) 10:43:24 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:24 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x12d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x4a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3391.215623] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x6600) [ 3391.258861] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:24 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x12e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:24 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0], 0x14) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000100), 0x4) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 10:43:24 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x4b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3391.481080] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:24 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:24 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x12f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:24 executing program 5: r0 = socket$inet(0x2, 0x7, 0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="b6000000ad19a63238ea338568aac4581166566ee83d5773e95f423b42f8d75c0d1bbdd8c5730d38f61b38107f23a610f92651ef2270e023d7beed0c6096a6ee4baae34cd7adb0c282863e767f37f97eddff01cc0a6971baf0dd74b0421f060001b1d8298a29b8eef179be339aa25e9211e2defce7b3f4728a5219aff81823ccfc014786a2c6227ea32133c1f1c56a2a450ae447b98314991e4d4f0b3850d86a1d054d67f04bb5ed5045a2c057e70bf029c4ecbedf84dbdfe245"], &(0x7f0000000180)=0xbe) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000001c0)={r1, 0x8}, 0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r2, &(0x7f0000004b40)=[{{&(0x7f0000003a80)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "08ca4e64a77c7e22cc761ab734ecdd5c6cc60f9edeb2e9e7e9e1daad2eba8174cadfef6fcb7f2acc090a08f997042551189074e228376750f28c02f88d8723"}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000001340)=']', 0x1}], 0x1, &(0x7f0000003cc0)}}, {{&(0x7f0000003d80)=@hci, 0x80, &(0x7f0000004200), 0x0, &(0x7f0000004280)=[{0x10}], 0x10}}], 0x2, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000040)=0x5) 10:43:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x4c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x6700) [ 3391.835819] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3391.903686] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x4d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:25 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x130, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:25 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xa, 0x181000) recvfrom$inet(r0, &(0x7f0000000080)=""/47, 0x2f, 0x10000, 0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) syz_open_dev$dri(&(0x7f0000000400)='/dev/dri/card#\x00', 0x0, 0x80000) syz_open_dev$midi(0x0, 0x20, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 10:43:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x8004) 10:43:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3392.218830] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:25 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x4e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:25 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x131, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3392.481158] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xe803) [ 3392.534747] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:25 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x4f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:25 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x132, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x28000, 0x0) ioctl$VIDIOC_RESERVED(r2, 0x5601, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0) 10:43:26 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x50, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:26 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x133, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x40000) 10:43:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3393.326498] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:26 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x134, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x51, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3393.419056] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:26 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xc0000) 10:43:26 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x135, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3393.675930] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3393.737480] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x10000, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x22a, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0xc81, 0x0) fchmodat(r5, &(0x7f0000000100)='./file0\x00', 0x100) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:43:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, 0x0) 10:43:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x52, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:27 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x136, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xfee00) 10:43:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, 0x0) [ 3394.344675] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x53, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:27 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x137, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3394.448688] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3394.484230] protocol 88fb is buggy, dev hsr_slave_0 [ 3394.489342] protocol 88fb is buggy, dev hsr_slave_1 [ 3394.494536] protocol 88fb is buggy, dev hsr_slave_0 [ 3394.499610] protocol 88fb is buggy, dev hsr_slave_1 [ 3394.504745] protocol 88fb is buggy, dev hsr_slave_0 [ 3394.509826] protocol 88fb is buggy, dev hsr_slave_1 10:43:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x231860) 10:43:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, 0x0) 10:43:27 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3394.798262] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3394.838305] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x10000, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x22a, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0xc81, 0x0) fchmodat(r5, &(0x7f0000000100)='./file0\x00', 0x100) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:43:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x138, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x54, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:28 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x0, 0x3f00}) 10:43:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x80ffff) 10:43:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x139, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x55, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3395.201167] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 3395.226433] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:28 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x0, 0x3f00}) 10:43:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xee0f00) 10:43:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x13a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3395.561974] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 3395.569721] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x10000, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r4, 0x22a, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0xc81, 0x0) fchmodat(r5, &(0x7f0000000100)='./file0\x00', 0x100) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:43:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x56, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:28 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x0, 0x3f00}) 10:43:28 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x13b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1000000) [ 3395.892942] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 3395.920829] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1}) 10:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x57, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:29 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x13c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:29 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3396.223811] usb usb9: usbfs: process 23610 (syz-executor1) did not claim interface 0 before use 10:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x58, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x2000000) [ 3396.404247] protocol 88fb is buggy, dev hsr_slave_0 [ 3396.409402] protocol 88fb is buggy, dev hsr_slave_1 [ 3396.564677] protocol 88fb is buggy, dev hsr_slave_0 [ 3396.569867] protocol 88fb is buggy, dev hsr_slave_1 10:43:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x3a, @multicast1, 0x4e22, 0x0, 'wlc\x00', 0x8, 0x3, 0x5}, {@multicast1, 0x4e20, 0x62425ef94fb023f2, 0x7, 0x3, 0x4}}, 0x44) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x400000, 0x0) bind$isdn(0xffffffffffffffff, &(0x7f0000000280)={0x22, 0x2, 0x33, 0x1ff, 0x8}, 0x6) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000240)) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="f0000000100001000000000000000000e0000001000000000000000000000000ac1414aa0000000000000000000000000000000000000000000000ff00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xf0}}, 0x0) shmget$private(0x0, 0x2000, 0xa, &(0x7f0000ffb000/0x2000)=nil) 10:43:29 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x13d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1}) 10:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x59, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x3000000) [ 3396.951008] usb usb9: usbfs: process 23629 (syz-executor1) did not claim interface 0 before use 10:43:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x5a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:30 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x13e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1}) 10:43:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) lstat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='./file0\x00', r2, r3) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000280)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffffd7, 0x0, 0x0, 0xfffffffffffffea6) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$NBD_DISCONNECT(r5, 0xab08) ioctl$KVM_NMI(r4, 0xae9a) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 3397.224437] usb usb9: usbfs: process 23645 (syz-executor1) did not claim interface 0 before use 10:43:30 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:30 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x13f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x4000000) 10:43:30 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x5b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3397.594731] usb usb9: usbfs: process 23661 (syz-executor1) did not claim interface 0 before use 10:43:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x5c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:30 executing program 5: socket$kcm(0xa, 0x2, 0x11) socketpair$unix(0x1, 0x49, 0x0, &(0x7f0000000640)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1ff, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x12001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x7ea6, @loopback}}, 0x3fc, 0x85, 0x6, 0x1, 0x4}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000380)=@assoc_value={r1, 0x6}, 0x8) r2 = semget$private(0x0, 0x5, 0x0) getresuid(&(0x7f0000000340)=0x0, &(0x7f00000003c0)=0x0, &(0x7f0000000440)) r5 = getegid() fstat(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000000500)=[0xee01, 0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000540)={{0x5, r3, r5, r6, r7, 0x63, 0x206}, 0x8000, 0xfffffffffffffffb, 0x1da2000000000}) socket$rxrpc(0x21, 0x2, 0x0) connect$netlink(r0, &(0x7f00000005c0)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)=[{&(0x7f0000001740)="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", 0x75c}], 0x1}, 0x0) setreuid(r3, r4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086607, 0x7fffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) close(r0) 10:43:30 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x140, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3397.801436] usb usb9: usbfs: process 23676 (syz-executor1) did not claim interface 0 before use 10:43:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x5000000) 10:43:31 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x141, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x2, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3398.045508] device bridge_slave_1 left promiscuous mode [ 3398.051041] bridge0: port 2(bridge_slave_1) entered disabled state [ 3398.072203] IPVS: ftp: loaded support on port[0] = 21 [ 3398.172506] device bridge_slave_0 left promiscuous mode [ 3398.181332] bridge0: port 1(bridge_slave_0) entered disabled state [ 3398.478740] device hsr_slave_1 left promiscuous mode [ 3398.518117] device hsr_slave_0 left promiscuous mode [ 3398.578408] team0 (unregistering): Port device team_slave_1 removed [ 3398.592537] team0 (unregistering): Port device team_slave_0 removed [ 3398.604302] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3398.660695] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3398.743575] bond0 (unregistering): Released all slaves [ 3399.038482] chnl_net:caif_netlink_parms(): no params data found [ 3399.079068] bridge0: port 1(bridge_slave_0) entered blocking state [ 3399.085576] bridge0: port 1(bridge_slave_0) entered disabled state [ 3399.092570] device bridge_slave_0 entered promiscuous mode [ 3399.099734] bridge0: port 2(bridge_slave_1) entered blocking state [ 3399.111718] bridge0: port 2(bridge_slave_1) entered disabled state [ 3399.122491] device bridge_slave_1 entered promiscuous mode [ 3399.173949] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3399.195403] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3399.220842] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3399.230788] team0: Port device team_slave_0 added [ 3399.239910] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3399.252971] team0: Port device team_slave_1 added [ 3399.270069] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3399.281629] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3399.357560] device hsr_slave_0 entered promiscuous mode [ 3399.394692] device hsr_slave_1 entered promiscuous mode [ 3399.434933] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3399.442000] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3399.473465] bridge0: port 2(bridge_slave_1) entered blocking state [ 3399.479872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3399.486588] bridge0: port 1(bridge_slave_0) entered blocking state [ 3399.492953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3399.547128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3399.557523] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3399.569831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3399.577933] bridge0: port 1(bridge_slave_0) entered disabled state [ 3399.586472] bridge0: port 2(bridge_slave_1) entered disabled state [ 3399.610851] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3399.624214] 8021q: adding VLAN 0 to HW filter on device team0 [ 3399.638307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3399.646613] bridge0: port 1(bridge_slave_0) entered blocking state [ 3399.652984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3399.672272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3399.680293] bridge0: port 2(bridge_slave_1) entered blocking state [ 3399.686704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3399.708725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3399.717459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3399.733966] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3399.756240] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3399.775633] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3399.782728] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3399.793982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3399.812450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3399.828778] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3399.837381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3399.851301] 8021q: adding VLAN 0 to HW filter on device batadv0 10:43:32 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x142, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:32 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000003f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x5d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x6000000) 10:43:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='eth0\x00', 0x42, 0x0, &(0x7f0000000740)={0x0, 0x0, 0x4}) mkdir(&(0x7f0000000380)='./file1\x00', 0xfffffffffffffffc) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x8, 0x0, 0x9}, 0xa) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x20000) stat(&(0x7f0000000800)='./file1\x00', &(0x7f0000000780)) statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f00000009c0)=""/250) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000006c0)={{0xa, 0x4e24, 0x1, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x7, 0x4, 0x0, 0x0, 0x0, 0x80000001]}, 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)) lsetxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.capability\x00', &(0x7f0000000400)=@v2={0x2000000, [{0x3f, 0x5}, {0x2, 0x758}]}, 0x14, 0x1) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x3, 0xc0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') r1 = socket$pppoe(0x18, 0x1, 0x0) lstat(&(0x7f0000000600)='./file0//ile0\x00', &(0x7f0000000640)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000140)=0xd, 0x4) socket$nl_generic(0x10, 0x3, 0x10) chroot(&(0x7f0000000080)='./file0\x00') ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000900)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000300)='ne\xff\x03\x00\x00\x00\x00\x00\x00\x00') stat(&(0x7f00000008c0)='./file1\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(r4, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[@ANYBLOB="3c0000001800200726bd7000fddbdf2580208009fe0400050010000008000500ac1414aa08000100e000000208001900", @ANYRES32=r5, @ANYBLOB="080007009e0f9d3368e54aed17e00000014d19bd40f6699e187dcd3da1f895f97abd00b6e1ab3d53acf4de"], 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x840) r6 = accept4(r0, &(0x7f0000000240)=@l2, &(0x7f00000000c0)=0x80, 0x80000) setsockopt$IP_VS_SO_SET_EDIT(r6, 0x0, 0x483, &(0x7f00000002c0)={0x0, @local, 0x4e22, 0x1, 'lc\x00', 0x18, 0x6, 0x52}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f0000000500)='fou\x00') 10:43:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5421, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3399.920719] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3400.086258] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:33 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x143, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5450, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x5e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3400.189796] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:33 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000007c0)={0x0, 0x7, 0x4, 0x0, {0x77359400}, {0x0, 0x0, 0x1000000000000, 0x0, 0x9, 0x0, "732ed1e9"}, 0x0, 0x0, @planes=0x0, 0x2}) 10:43:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x7000000) 10:43:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5451, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:33 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x5f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:33 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x144, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:33 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x20, 0x400) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)={0x55, 0x7ff, 0x4, {0x10000, 0x5}, {0xfffffffffffffffb, 0x6}, @const={0x100000001, {0x10000, 0x2, 0x5, 0xd32}}}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x4e21, @local}}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x8000a, 0x4000000000000ff) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000000)={0x7, 0x103, 0x1, {0x5, 0x6, 0x1, 0xc58}}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='irlan0\x00\x00\x00\x00\x00\x16\x00', 0x10) r2 = add_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="04168dc3b34c6ccd4ccc97bad32555def62818a8c0aeaaef4a4f614d8a7de316e88b27d767e92d8d6454259ec19233f6e14000ef870cb84422a7ee44fb2bc051d9969161358fbe2e38a2254933a9a6ae367ad58f9c6f3e118989bb942edee5c8ec8a5e58d2840c7ede6da4b9f117030ae7be65c25432f72318a4b896d9fadf69034c8103a3fe6ef03461e150ce60fa2c0dd11450deef2d513d96288d6d0c19e25d26f123c2fab4d8cb587bb791cee21a294a827c1d4809adfd51e2fff6c5233d7dbb9c86b4c86a030ca61ae75c0fdf13234f0b380bdc6494788e2ceab4f79c627e85497ab89c13ebbaf55e5b2daae514af9502d2dfc2", 0xf6, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$search(0xa, r2, &(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, r3) 10:43:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5452, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3400.655986] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x8000000) 10:43:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x60, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3400.765250] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:33 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r1, 0x1, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x65}}, ["", ""]}, 0x24}}, 0x4000) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="30000000860f0000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000e96c1d8f2a75", @ANYRES32=0x0, @ANYBLOB="e9843b56a4ce07001c00866c22e2582aedc8386c271050f2e858db984afb5d80a3cfaa0753bfb050ab3fd4b85bcc97abb32b6cab2b66f0d1e6c3a791c295b2d6f1ff3a1ba9a68ba09b97cc1a251d3b634a4c5a5db2729b8185f05018fd9afebfd4ae4b077e638c37bf9ed3c6a852fcfee2a6e4e219cd65d20e65e6001473345dc5e7f68798cdf91bdbbc72cb590a6bd5d2ca8ec7b583fe903c1da9ea6288414f", @ANYRES32], 0x30}}, 0x0) 10:43:33 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x145, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:34 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5460, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:34 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ptype\x00') ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000200)={0x0, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e24, @empty}, 0x8, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)='ip6gretap0\x00', 0x1, 0x5, 0x6}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x200000088) connect$inet6(r1, &(0x7f0000000280), 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f000072eff0)=[{&(0x7f00000000c0)="480000001400257f09004b01fcfc8c860a881700f217e0060000e30000e5ffffbb5603000000000000000000ffff5bf109000000ed5e000000006203005b00000000000000000000", 0x48}], 0x1) ioctl$sock_bt_hci(r0, 0x400448dc, &(0x7f00000002c0)="8da13aea9528730c0ddb3b6944e950c78ed78be8b71429572cfaf90be628eda9a52de2bff179ee29a9412f00a5e67d3971a0397687a5dc7835acc087bc004b63a987e188be") 10:43:34 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x146, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x61, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3401.139211] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x550b, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x9000000) [ 3401.268123] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x1}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20000, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000280)) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000100)={0x3ff, 0x11, 0x1}) 10:43:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5514, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x62, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:34 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:34 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x147, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xa000000) [ 3401.678528] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x63, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3401.753691] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:34 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x148, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x551f, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:34 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550c, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x149, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3402.051025] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:35 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0xd, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 10:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x64, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x14a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xb000000) [ 3402.390667] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:35 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3402.452447] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:35 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x14b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x65, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000013, &(0x7f0000000040)=0x100000001, 0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x280000, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000140)={0x20, 0xffffffffffffffda, 0x4, {0x0, 0x3}}, 0x20) connect$inet6(r0, &(0x7f0000000240), 0x1c) r2 = syz_open_dev$media(0x0, 0x0, 0x400000) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000002fc0)=[{{&(0x7f0000000900)=@alg, 0x80, &(0x7f0000002a80)=[{&(0x7f0000000280)=""/124, 0xfeab}, {&(0x7f0000000780)=""/217}, {&(0x7f0000000980)=""/241}, {&(0x7f0000000a80)=""/4096}, {&(0x7f0000001a80)=""/4096}, {&(0x7f0000000880)=""/70}, {&(0x7f0000000300)=""/54}], 0x0, &(0x7f0000000340)=""/160, 0xa0}}], 0x569, 0x0, &(0x7f00000001c0)={0x77359400}) write$FUSE_POLL(r2, &(0x7f0000000000)={0x18, 0xfffffffffffffffe, 0x6, {0x3}}, 0x18) shutdown(r0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0xb6ad31494a58c02e, 0xc1) [ 3402.613144] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:35 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3402.822593] tls_set_device_offload_rx: netdev sit0 with no TLS offload [ 3402.877625] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xc000000) 10:43:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x14c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x66, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:36 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r2, &(0x7f0000000040), 0x0) dup3(r1, r2, 0x0) 10:43:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x14d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3403.120138] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3403.197387] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:36 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x67, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004551e, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x14e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xd000000) 10:43:36 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x35fad820eb05b2eb) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x10001, &(0x7f0000000080)=0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mmap(&(0x7f0000050000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) [ 3403.600552] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x40049409, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x14f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3403.685589] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00008f0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000000c0)={0x9, 0x5, 0x3ff, 0x8, 0x7, 0x10001}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair(0x15, 0x3, 0x3, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x8000, @mcast2, 0x5734}}, 0x1000, 0x9}, &(0x7f0000000280)=0x90) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e24, 0x216d, @empty, 0x1}}}, 0x84) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(r5, 0xc0445624, &(0x7f0000000380)={0x7fff, 0x9, "7fca32179012fa79177be33cc4e1bb83045fb5d6da0a647affd27a9d81b18b85", 0x4, 0xf814, 0x4, 0x3, 0x40}) dup3(r2, r1, 0x80000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x5) ioctl$TCFLSH(r0, 0x5437, 0x0) 10:43:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x68, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:36 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xe000000) 10:43:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x150, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3403.928725] mkiss: ax0: crc mode is auto. 10:43:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4008550c, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3404.046675] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3404.142380] mkiss: ax0: crc mode is auto. [ 3404.168514] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x69, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x151, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:37 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x42000) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000040)={0x7, 0x100000001, 0x6}, 0xc) utimensat(r0, 0x0, &(0x7f0000f84fe0)={{0x0, 0x3ffffffe}, {0x0, 0x2710}}, 0x0) 10:43:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xf000000) 10:43:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x6a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:37 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:37 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x152, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:37 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000001c0)=0x3f, 0x4) [ 3404.935556] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4008550d, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x6b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:38 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:38 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000001c0)=0x3f, 0x4) 10:43:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x153, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x10000000) [ 3405.235966] libceph: connect [d::]:6640 error -101 [ 3405.241377] libceph: mon0 [d::]:6640 connect error 10:43:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x40085511, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3405.334728] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x6c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x154, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3405.456727] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:38 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000001c0)=0x3f, 0x4) 10:43:38 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4020940d, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x11000000) 10:43:38 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000001c0)=0x3f, 0x4) 10:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x6d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3405.886488] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x155, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3405.965563] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:39 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:39 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:43:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x41045508, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3406.208586] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x156, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x12000000) [ 3406.276881] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:39 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x6e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045503, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:39 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3406.505417] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x157, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:39 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x6f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3406.573123] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3406.646806] libceph: connect [d::]:6640 error -101 10:43:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3406.694535] libceph: mon0 [d::]:6640 connect error [ 3406.739005] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3406.772022] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor1' sets config #161 [ 3406.779942] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:39 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:43:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x70, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x13000000) 10:43:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x158, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3406.904522] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3406.936274] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:43:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000100)={0xa1, 0x3f00}) 10:43:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x159, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:43:40 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3407.188429] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3407.614785] libceph: connect [d::]:6640 error -101 [ 3407.619838] libceph: mon0 [d::]:6640 connect error [ 3408.647836] libceph: connect [d::]:6640 error -101 [ 3408.652918] libceph: mon0 [d::]:6640 connect error [ 3409.604751] libceph: connect [d::]:6640 error -101 [ 3409.609756] libceph: mon0 [d::]:6640 connect error [ 3410.644674] libceph: connect [d::]:6640 error -101 [ 3410.649797] libceph: mon0 [d::]:6640 connect error [ 3411.605031] libceph: connect [d::]:6640 error -101 [ 3411.610139] libceph: mon0 [d::]:6640 connect error [ 3412.654783] libceph: connect [d::]:6640 error -101 [ 3412.659872] libceph: mon0 [d::]:6640 connect error [ 3413.614707] libceph: connect [d::]:6640 error -101 [ 3413.619766] libceph: mon0 [d::]:6640 connect error [ 3414.658397] libceph: connect [d::]:6640 error -101 [ 3414.663504] libceph: mon0 [d::]:6640 connect error [ 3415.614743] libceph: connect [d::]:6640 error -101 [ 3415.619778] libceph: mon0 [d::]:6640 connect error [ 3416.644661] libceph: connect [d::]:6640 error -101 [ 3416.649700] libceph: mon0 [d::]:6640 connect error [ 3417.604817] libceph: connect [d::]:6640 error -101 [ 3417.609930] libceph: mon0 [d::]:6640 connect error [ 3418.644696] libceph: connect [d::]:6640 error -101 [ 3418.649718] libceph: mon0 [d::]:6640 connect error [ 3419.604897] libceph: connect [d::]:6640 error -101 [ 3419.610094] libceph: mon0 [d::]:6640 connect error [ 3420.655718] libceph: connect [d::]:6640 error -101 [ 3420.660754] libceph: mon0 [d::]:6640 connect error [ 3421.604698] libceph: connect [d::]:6640 error -101 [ 3421.609888] libceph: mon0 [d::]:6640 connect error [ 3422.644577] libceph: connect [d::]:6640 error -101 [ 3422.649640] libceph: mon0 [d::]:6640 connect error [ 3423.604764] libceph: connect [d::]:6640 error -101 [ 3423.609789] libceph: mon0 [d::]:6640 connect error [ 3424.644643] libceph: connect [d::]:6640 error -101 [ 3424.649783] libceph: mon0 [d::]:6640 connect error [ 3425.604589] libceph: connect [d::]:6640 error -101 [ 3425.609628] libceph: mon0 [d::]:6640 connect error [ 3426.645511] libceph: connect [d::]:6640 error -101 [ 3426.650653] libceph: mon0 [d::]:6640 connect error [ 3427.604696] libceph: connect [d::]:6640 error -101 [ 3427.609726] libceph: mon0 [d::]:6640 connect error [ 3428.644556] libceph: connect [d::]:6640 error -101 [ 3428.649697] libceph: mon0 [d::]:6640 connect error [ 3429.604652] libceph: connect [d::]:6640 error -101 [ 3429.609695] libceph: mon0 [d::]:6640 connect error [ 3430.644787] libceph: connect [d::]:6640 error -101 [ 3430.649975] libceph: mon0 [d::]:6640 connect error [ 3431.604636] libceph: connect [d::]:6640 error -101 [ 3431.609679] libceph: mon0 [d::]:6640 connect error [ 3432.645531] libceph: connect [d::]:6640 error -101 [ 3432.650554] libceph: mon0 [d::]:6640 connect error [ 3433.604810] libceph: connect [d::]:6640 error -101 [ 3433.609869] libceph: mon0 [d::]:6640 connect error [ 3434.644670] libceph: connect [d::]:6640 error -101 [ 3434.649939] libceph: mon0 [d::]:6640 connect error [ 3435.605546] libceph: connect [d::]:6640 error -101 [ 3435.610788] libceph: mon0 [d::]:6640 connect error [ 3436.655343] libceph: connect [d::]:6640 error -101 [ 3436.660371] libceph: mon0 [d::]:6640 connect error [ 3436.804472] IPVS: stopping backup sync thread 10015 ... [ 3436.810683] device bridge_slave_1 left promiscuous mode [ 3436.816415] bridge0: port 2(bridge_slave_1) entered disabled state [ 3436.856939] device bridge_slave_0 left promiscuous mode [ 3436.862427] bridge0: port 1(bridge_slave_0) entered disabled state [ 3437.604772] libceph: connect [d::]:6640 error -101 [ 3437.609983] libceph: mon0 [d::]:6640 connect error [ 3438.655378] libceph: connect [d::]:6640 error -101 [ 3438.660498] libceph: mon0 [d::]:6640 connect error [ 3439.604576] libceph: connect [d::]:6640 error -101 [ 3439.609608] libceph: mon0 [d::]:6640 connect error [ 3440.644644] libceph: connect [d::]:6640 error -101 [ 3440.649726] libceph: mon0 [d::]:6640 connect error [ 3441.007902] device hsr_slave_1 left promiscuous mode [ 3441.070433] device hsr_slave_0 left promiscuous mode [ 3441.130819] team0 (unregistering): Port device team_slave_1 removed [ 3441.145981] team0 (unregistering): Port device team_slave_0 removed [ 3441.158676] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3441.230791] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3441.325290] bond0 (unregistering): Released all slaves [ 3441.614684] libceph: connect [d::]:6640 error -101 [ 3441.619747] libceph: mon0 [d::]:6640 connect error [ 3442.654891] libceph: connect [d::]:6640 error -101 [ 3442.660038] libceph: mon0 [d::]:6640 connect error [ 3443.604984] libceph: connect [d::]:6640 error -101 [ 3443.610004] libceph: mon0 [d::]:6640 connect error [ 3444.645449] libceph: connect [d::]:6640 error -101 [ 3444.650496] libceph: mon0 [d::]:6640 connect error [ 3445.604770] libceph: connect [d::]:6640 error -101 [ 3445.609894] libceph: mon0 [d::]:6640 connect error [ 3446.644541] libceph: connect [d::]:6640 error -101 [ 3446.649580] libceph: mon0 [d::]:6640 connect error [ 3447.604668] libceph: connect [d::]:6640 error -101 [ 3447.609709] libceph: mon0 [d::]:6640 connect error [ 3448.646194] libceph: connect [d::]:6640 error -101 [ 3448.651276] libceph: mon0 [d::]:6640 connect error [ 3449.604847] libceph: connect [d::]:6640 error -101 [ 3449.609973] libceph: mon0 [d::]:6640 connect error [ 3450.645756] libceph: connect [d::]:6640 error -101 [ 3450.650817] libceph: mon0 [d::]:6640 connect error [ 3451.604750] libceph: connect [d::]:6640 error -101 [ 3451.609865] libceph: mon0 [d::]:6640 connect error [ 3452.644825] libceph: connect [d::]:6640 error -101 [ 3452.649887] libceph: mon0 [d::]:6640 connect error [ 3453.604915] libceph: connect [d::]:6640 error -101 [ 3453.609979] libceph: mon0 [d::]:6640 connect error [ 3454.644629] libceph: connect [d::]:6640 error -101 [ 3454.649643] libceph: mon0 [d::]:6640 connect error [ 3455.604606] libceph: connect [d::]:6640 error -101 [ 3455.609618] libceph: mon0 [d::]:6640 connect error [ 3456.645769] libceph: connect [d::]:6640 error -101 [ 3456.650948] libceph: mon0 [d::]:6640 connect error [ 3457.604570] libceph: connect [d::]:6640 error -101 [ 3457.609667] libceph: mon0 [d::]:6640 connect error [ 3458.644636] libceph: connect [d::]:6640 error -101 [ 3458.649839] libceph: mon0 [d::]:6640 connect error [ 3459.604934] libceph: connect [d::]:6640 error -101 [ 3459.610111] libceph: mon0 [d::]:6640 connect error [ 3460.644796] libceph: connect [d::]:6640 error -101 [ 3460.649907] libceph: mon0 [d::]:6640 connect error [ 3461.604787] libceph: connect [d::]:6640 error -101 [ 3461.609924] libceph: mon0 [d::]:6640 connect error [ 3462.645310] libceph: connect [d::]:6640 error -101 [ 3462.650400] libceph: mon0 [d::]:6640 connect error [ 3463.604577] libceph: connect [d::]:6640 error -101 [ 3463.609757] libceph: mon0 [d::]:6640 connect error [ 3464.644691] libceph: connect [d::]:6640 error -101 [ 3464.649692] libceph: mon0 [d::]:6640 connect error [ 3465.604686] libceph: connect [d::]:6640 error -101 [ 3465.609962] libceph: mon0 [d::]:6640 connect error 10:44:38 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x71, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045510, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x14000000) 10:44:38 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000003f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x15a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3465.693623] libceph: connect [d::]:6640 error -101 [ 3465.698699] libceph: mon0 [d::]:6640 connect error [ 3465.742269] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x15b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045515, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x72, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:38 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3465.788899] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3465.868413] libceph: connect [d::]:6640 error -101 10:44:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x15000000) 10:44:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045518, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3465.901906] libceph: mon0 [d::]:6640 connect error [ 3465.912823] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3465.961395] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:39 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x15c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:39 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x73, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045519, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x16000000) 10:44:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x15d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3466.596090] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:39 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004551a, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x74, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3466.683899] libceph: connect [d::]:6640 error -101 10:44:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x15e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3466.712086] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3466.728189] libceph: mon0 [d::]:6640 connect error 10:44:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80085504, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3466.778400] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:40 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x17000000) 10:44:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x75, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x15f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8008550e, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:40 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140), 0x4000) r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x160, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8008551c, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3467.465421] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:40 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140), 0x4000) r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x76, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:40 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8008551d, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x18000000) 10:44:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x77, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x161, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:40 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140), 0x4000) r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8010550e, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x78, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:40 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140), 0x4000) r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:40 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x162, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x79, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:41 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x7a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:41 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140), 0x4000) syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x19000000) 10:44:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x163, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:41 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140), 0x4000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x7b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x164, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x7c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3468.750870] libceph: connect [d::]:6640 error -101 [ 3468.756853] libceph: mon0 [d::]:6640 connect error 10:44:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1a000000) 10:44:41 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x165, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3468.965146] IPVS: ftp: loaded support on port[0] = 21 [ 3469.068595] device bridge_slave_1 left promiscuous mode [ 3469.074438] bridge0: port 2(bridge_slave_1) entered disabled state [ 3469.104998] device bridge_slave_0 left promiscuous mode [ 3469.110449] bridge0: port 1(bridge_slave_0) entered disabled state [ 3469.248627] device hsr_slave_1 left promiscuous mode [ 3469.298680] device hsr_slave_0 left promiscuous mode [ 3469.350918] team0 (unregistering): Port device team_slave_1 removed [ 3469.363862] team0 (unregistering): Port device team_slave_0 removed [ 3469.377393] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3469.449601] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3469.554044] bond0 (unregistering): Released all slaves [ 3469.698892] IPVS: ftp: loaded support on port[0] = 21 [ 3469.726575] chnl_net:caif_netlink_parms(): no params data found [ 3469.812256] bridge0: port 1(bridge_slave_0) entered blocking state [ 3469.818882] bridge0: port 1(bridge_slave_0) entered disabled state [ 3469.826693] device bridge_slave_0 entered promiscuous mode [ 3469.875207] bridge0: port 2(bridge_slave_1) entered blocking state [ 3469.884360] bridge0: port 2(bridge_slave_1) entered disabled state [ 3469.892472] device bridge_slave_1 entered promiscuous mode [ 3469.919829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3469.930182] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3469.981403] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3470.000412] team0: Port device team_slave_0 added [ 3470.049384] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3470.067064] team0: Port device team_slave_1 added [ 3470.106726] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3470.123793] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3470.147820] chnl_net:caif_netlink_parms(): no params data found [ 3470.227728] device hsr_slave_0 entered promiscuous mode [ 3470.274586] device hsr_slave_1 entered promiscuous mode [ 3470.330403] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3470.362855] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3470.431840] bridge0: port 2(bridge_slave_1) entered blocking state [ 3470.438271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3470.444950] bridge0: port 1(bridge_slave_0) entered blocking state [ 3470.451311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3470.483425] bridge0: port 1(bridge_slave_0) entered blocking state [ 3470.501413] bridge0: port 1(bridge_slave_0) entered disabled state [ 3470.513294] device bridge_slave_0 entered promiscuous mode [ 3470.532652] bridge0: port 2(bridge_slave_1) entered blocking state [ 3470.543477] bridge0: port 2(bridge_slave_1) entered disabled state [ 3470.561890] device bridge_slave_1 entered promiscuous mode [ 3470.622529] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3470.643425] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3470.692927] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3470.711964] team0: Port device team_slave_0 added [ 3470.721550] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3470.740270] team0: Port device team_slave_1 added [ 3470.751533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3470.769772] bridge0: port 1(bridge_slave_0) entered disabled state [ 3470.781990] bridge0: port 2(bridge_slave_1) entered disabled state [ 3470.808447] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3470.917847] device hsr_slave_0 entered promiscuous mode [ 3470.964684] device hsr_slave_1 entered promiscuous mode [ 3471.014852] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3471.021917] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3471.047260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3471.087130] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3471.099226] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3471.128052] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3471.145574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3471.152733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3471.168129] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3471.176027] 8021q: adding VLAN 0 to HW filter on device team0 [ 3471.192749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3471.201694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3471.215138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3471.222898] bridge0: port 1(bridge_slave_0) entered blocking state [ 3471.229310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3471.238251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3471.252377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3471.260980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3471.268890] bridge0: port 2(bridge_slave_1) entered blocking state [ 3471.275315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3471.297027] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3471.308954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3471.316226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3471.338044] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3471.357053] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3471.365121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3471.377073] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3471.387520] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3471.396170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3471.404376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3471.413823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3471.422209] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3471.431345] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3471.441541] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3471.449675] 8021q: adding VLAN 0 to HW filter on device team0 [ 3471.465586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3471.476391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3471.483261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3471.492622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3471.500912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3471.509717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3471.520862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3471.535919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3471.554473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3471.562505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3471.570708] bridge0: port 1(bridge_slave_0) entered blocking state [ 3471.577156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3471.585126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3471.592854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3471.601155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3471.611676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3471.621424] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3471.627908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3471.637389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3471.646144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3471.653723] bridge0: port 2(bridge_slave_1) entered blocking state [ 3471.660157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3471.671194] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3471.682905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3471.698603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3471.711638] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3471.719133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3471.742408] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3471.756418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3471.763708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3471.772629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3471.783663] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3471.802706] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3471.810289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3471.818616] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3471.830263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3471.854362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3471.862055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 10:44:44 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x7d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:44 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x166, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1b000000) 10:44:44 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140), 0x4000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3471.896279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3471.908244] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3471.918310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3471.926189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3471.929776] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3471.944948] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3471.951002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:44:45 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3472.063438] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3472.097301] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:45 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x167, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3472.170701] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x7e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3472.392443] libceph: connect [d::]:6640 error -101 [ 3472.399508] libceph: mon0 [d::]:6640 connect error [ 3472.841709] 8021q: adding VLAN 0 to HW filter on device batadv0 10:44:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8108551b, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:46 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1c000000) 10:44:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x168, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x82, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3473.298365] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3473.328928] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:46 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3473.350836] libceph: connect [d::]:6640 error -101 [ 3473.356417] libceph: mon0 [d::]:6640 connect error 10:44:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x169, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1d000000) 10:44:46 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3473.510969] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3473.546830] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:46 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x16a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:46 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3473.702883] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3473.863548] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3473.901832] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0045878, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x16b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1e000000) 10:44:47 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x83, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3474.122963] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:47 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x16c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3474.330440] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x26000000) [ 3474.412296] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3474.445662] libceph: connect [d::]:6640 error -101 [ 3474.450888] libceph: mon0 [d::]:6640 connect error 10:44:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x16d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:47 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000000000003f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:47 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x16e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3474.663842] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3474.697428] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0045878, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x29000000) 10:44:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x16f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x84, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3475.059605] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3475.129414] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:48 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x170, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x2e000000) [ 3475.307319] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:48 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3475.372681] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x171, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3475.569605] libceph: connect [d::]:6640 error -101 [ 3475.576975] libceph: mon0 [d::]:6640 connect error [ 3475.679992] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3475.742666] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc00c5512, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x172, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x36000000) 10:44:49 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x85, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:49 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x173, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x3e000000) 10:44:49 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3476.220811] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3476.260392] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:49 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x174, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3476.482750] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x3f000000) [ 3476.551204] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3476.570805] libceph: connect [d::]:6640 error -101 [ 3476.578561] libceph: mon0 [d::]:6640 connect error 10:44:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x175, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:49 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x40000000) 10:44:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x86, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3477.011914] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:50 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x176, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x4f000000) [ 3477.214244] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3477.252922] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x177, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:50 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:50 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x60182300) [ 3477.526655] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3477.609474] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:50 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000003f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:50 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:50 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x178, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x87, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x64000000) [ 3477.952463] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3477.994655] libceph: connect [d::]:6640 error -101 [ 3477.999785] libceph: mon0 [d::]:6640 connect error [ 3478.035264] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:51 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x179, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:51 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x65000000) 10:44:51 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x17a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3478.273682] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:51 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3478.335756] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:51 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x17b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3478.490750] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3478.539454] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3478.548546] libceph: connect [d::]:6640 error -101 [ 3478.553751] libceph: mon0 [d::]:6640 connect error 10:44:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x66000000) 10:44:51 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:51 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x17c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x88, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:51 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3478.892461] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3478.948506] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:52 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x17d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3478.993662] libceph: connect [d::]:6640 error -101 [ 3479.011310] libceph: mon0 [d::]:6640 connect error 10:44:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x67000000) [ 3479.140131] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3479.169537] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:52 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x17e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:52 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3479.334718] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3479.479704] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3479.574557] libceph: connect [d::]:6640 error -101 [ 3479.579786] libceph: mon0 [d::]:6640 connect error 10:44:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x80040000) 10:44:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0182500, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x17f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:52 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3479.696104] device bridge_slave_1 left promiscuous mode [ 3479.701598] bridge0: port 2(bridge_slave_1) entered disabled state 10:44:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x89, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:52 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(0x0, 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3479.744570] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:52 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x180, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:52 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3479.853979] device bridge_slave_0 left promiscuous mode [ 3479.886432] bridge0: port 1(bridge_slave_0) entered disabled state 10:44:53 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(0x0, 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:44:53 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x181, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xe8030000) [ 3480.090767] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:53 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x182, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:53 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(0x0, 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3485.748048] device hsr_slave_1 left promiscuous mode [ 3485.800851] device hsr_slave_0 left promiscuous mode [ 3485.860646] team0 (unregistering): Port device team_slave_1 removed [ 3485.873392] team0 (unregistering): Port device team_slave_0 removed [ 3485.887334] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3485.959555] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3486.044331] bond0 (unregistering): Released all slaves 10:44:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x183, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185502, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xf0ffffff) 10:44:59 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3486.210057] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000000000000000000000003f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3486.346911] Left network mode 10:44:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x184, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185503, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:59 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3486.493132] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:44:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185504, &(0x7f0000000100)={0xa1, 0x3f00}) 10:44:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:44:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xf2ffffff) 10:44:59 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x185, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3486.826813] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:44:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185505, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:00 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x186, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185506, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xf3ffffff) 10:45:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x187, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3487.237442] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:00 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185507, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x188, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x8f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3487.620214] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:00 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc018550a, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xfdfdffff) 10:45:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x90, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x189, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:01 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185548, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:01 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x18a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xffff8000) 10:45:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x91, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc018554c, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:01 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', 0x0, &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3488.248921] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:01 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x18b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185560, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x92, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xfffffdfd) [ 3488.543315] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:01 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', 0x0, &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x18c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:01 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185568, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x93, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:02 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', 0x0, &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x18d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc018556c, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xfffffff0) 10:45:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x94, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:02 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 10:45:02 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x18e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185574, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x95, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x18f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc018557a, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xfffffff2) 10:45:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x96, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:03 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:03 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x190, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0186300, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x97, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3491.200658] IPVS: ftp: loaded support on port[0] = 21 10:45:04 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x191, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xfffffff3) 10:45:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0189436, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:04 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 3491.499395] chnl_net:caif_netlink_parms(): no params data found 10:45:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x99, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:04 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x192, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc020660b, &(0x7f0000000100)={0xa1, 0x3f00}) [ 3491.721816] bridge0: port 1(bridge_slave_0) entered blocking state [ 3491.758486] bridge0: port 1(bridge_slave_0) entered disabled state [ 3491.802961] device bridge_slave_0 entered promiscuous mode [ 3491.818481] bridge0: port 2(bridge_slave_1) entered blocking state [ 3491.826637] bridge0: port 2(bridge_slave_1) entered disabled state [ 3491.834063] device bridge_slave_1 entered promiscuous mode [ 3491.848688] IPVS: ftp: loaded support on port[0] = 21 [ 3491.876805] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3491.926705] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3492.006243] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3492.013726] team0: Port device team_slave_0 added [ 3492.030073] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3492.043120] team0: Port device team_slave_1 added [ 3492.071427] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3492.096897] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3492.209924] chnl_net:caif_netlink_parms(): no params data found [ 3492.267582] device hsr_slave_0 entered promiscuous mode [ 3492.314552] device hsr_slave_1 entered promiscuous mode [ 3492.359539] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3492.383004] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3492.430441] bridge0: port 1(bridge_slave_0) entered blocking state [ 3492.440272] bridge0: port 1(bridge_slave_0) entered disabled state [ 3492.453256] device bridge_slave_0 entered promiscuous mode [ 3492.473616] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3492.482303] bridge0: port 2(bridge_slave_1) entered blocking state [ 3492.489075] bridge0: port 2(bridge_slave_1) entered disabled state [ 3492.496608] device bridge_slave_1 entered promiscuous mode [ 3492.520703] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3492.530540] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3492.556797] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3492.563979] team0: Port device team_slave_0 added [ 3492.570055] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3492.577604] team0: Port device team_slave_1 added [ 3492.583009] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3492.591637] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3492.659814] device hsr_slave_0 entered promiscuous mode [ 3492.724742] device hsr_slave_1 entered promiscuous mode [ 3492.787058] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3492.944753] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3492.971293] bridge0: port 2(bridge_slave_1) entered blocking state [ 3492.977664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3492.984387] bridge0: port 1(bridge_slave_0) entered blocking state [ 3492.990782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3493.161337] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3493.176570] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3493.192977] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3493.355843] bridge0: port 1(bridge_slave_0) entered disabled state [ 3493.362903] bridge0: port 2(bridge_slave_1) entered disabled state [ 3493.373825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3493.381156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3493.391221] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3493.397714] 8021q: adding VLAN 0 to HW filter on device team0 [ 3493.411749] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 3493.418570] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3493.426409] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3493.436354] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3493.446315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3493.602231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3493.611971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3493.619821] bridge0: port 1(bridge_slave_0) entered blocking state [ 3493.626206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3493.633175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3493.642181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3493.650025] bridge0: port 2(bridge_slave_1) entered blocking state [ 3493.656446] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3493.666198] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3493.826604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3493.837515] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3493.843738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3493.850879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3493.860901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3494.011608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3494.023161] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3494.032943] 8021q: adding VLAN 0 to HW filter on device team0 [ 3494.041549] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3494.055214] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3494.210726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3494.219180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3494.227403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3494.381741] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3494.389477] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3494.397076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3494.405851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3494.413487] bridge0: port 1(bridge_slave_0) entered blocking state [ 3494.419882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3494.429733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3494.720087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3494.728445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3494.738995] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3494.749665] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3494.756977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3494.765287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3494.772845] bridge0: port 2(bridge_slave_1) entered blocking state [ 3494.779253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3494.786670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3494.796434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3494.805510] device bridge_slave_1 left promiscuous mode [ 3494.811012] bridge0: port 2(bridge_slave_1) entered disabled state [ 3494.854907] device bridge_slave_0 left promiscuous mode [ 3494.860383] bridge0: port 1(bridge_slave_0) entered disabled state [ 3494.905497] device bridge_slave_1 left promiscuous mode [ 3494.910926] bridge0: port 2(bridge_slave_1) entered disabled state [ 3494.975432] device bridge_slave_0 left promiscuous mode [ 3494.980927] bridge0: port 1(bridge_slave_0) entered disabled state [ 3498.817473] bond1 (unregistering): Released all slaves [ 3498.887933] device hsr_slave_1 left promiscuous mode [ 3498.940946] device hsr_slave_0 left promiscuous mode [ 3499.001558] team0 (unregistering): Port device team_slave_1 removed [ 3499.011949] team0 (unregistering): Port device team_slave_0 removed [ 3499.025341] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3499.060236] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3499.161385] bond0 (unregistering): Released all slaves [ 3499.366977] device hsr_slave_1 left promiscuous mode [ 3499.420934] device hsr_slave_0 left promiscuous mode [ 3499.480647] team0 (unregistering): Port device team_slave_1 removed [ 3499.491843] team0 (unregistering): Port device team_slave_0 removed [ 3499.505516] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3499.541138] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3499.649867] bond0 (unregistering): Released all slaves [ 3499.762076] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3499.772987] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3499.784687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3499.792544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3499.800302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3499.811385] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3499.822194] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3499.828995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3499.837151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3499.849198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3499.862356] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3499.869048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3499.877954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3499.886079] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3499.896377] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3499.911508] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3499.919323] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3499.927908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3499.940361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3499.948429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3499.962839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3499.985135] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3499.991949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3500.000818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3500.015691] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3500.021737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3500.041650] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3500.062613] 8021q: adding VLAN 0 to HW filter on device batadv0 10:45:13 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x8000000000) 10:45:13 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x193, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f02}) 10:45:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3500.092819] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3500.104562] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:13 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x194, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3500.219596] usb usb9: usbfs: process 25343 (syz-executor1) did not claim interface 2 before use [ 3500.226860] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3500.256599] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:13 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 10:45:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f03}) 10:45:13 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x7fd857aef700) 10:45:13 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x195, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="08010000", 0x4) [ 3500.604803] usb usb9: usbfs: process 25372 (syz-executor1) did not claim interface 3 before use 10:45:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3500.685986] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:13 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f04}) 10:45:13 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x196, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:13 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$kcm(0x11, 0x0, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) getpgrp(0x0) getgid() r1 = accept(r0, 0x0, 0x0) rename(0x0, &(0x7f0000000200)='./file0\x00') socket$inet6_sctp(0xa, 0x0, 0x84) sendmsg$rds(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/250, 0xfa}], 0x1}, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x5) [ 3500.891781] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x4000000000000) [ 3500.945979] usb usb9: usbfs: process 25400 (syz-executor1) did not claim interface 4 before use 10:45:14 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3500.988893] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:14 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x197, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f05}) 10:45:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3501.181276] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3501.257065] usb usb9: usbfs: process 25433 (syz-executor1) did not claim interface 5 before use [ 3501.268058] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:14 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x198, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:14 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xc000000000000) 10:45:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f06}) 10:45:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x9f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:14 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000004480)=[{{&(0x7f0000000080)=@ax25={{0x3, @bcast}, [@null, @default, @rose, @default, @null, @default, @netrom, @null]}, 0x80, &(0x7f00000014c0)=[{&(0x7f00000002c0)=""/221, 0xdd}, {&(0x7f0000000100)=""/46, 0x2e}, {&(0x7f00000003c0)=""/67, 0x43}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x5, &(0x7f0000001540)=""/65, 0x41}, 0x1}, {{&(0x7f00000015c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001640)=""/255, 0xff}, {&(0x7f0000001740)=""/252, 0xfc}, {&(0x7f0000001840)=""/77, 0x4d}, {&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f0000000140)=""/6, 0x6}, {&(0x7f00000001c0)=""/16, 0x10}], 0x6}, 0x100}, {{&(0x7f0000003080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000004380)=[{&(0x7f0000003100)=""/128, 0x80}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000004180)=""/2, 0x2}, {&(0x7f00000041c0)=""/181, 0xb5}, {&(0x7f0000004280)=""/185, 0xb9}, {&(0x7f0000004340)=""/4, 0x4}], 0x6, &(0x7f0000004400)=""/84, 0x54}}], 0x3, 0x3a, &(0x7f0000000200)={0x0, 0x1c9c380}) [ 3501.607276] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:14 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x199, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3501.676050] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3501.704751] usb usb9: usbfs: process 25468 (syz-executor1) did not claim interface 6 before use [ 3501.740735] netlink: 'syz-executor5': attribute type 29 has an invalid length. 10:45:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x80ffff00000000) 10:45:14 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f07}) [ 3501.802300] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 10:45:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3501.888952] netlink: 'syz-executor5': attribute type 29 has an invalid length. 10:45:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x19a, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3501.950067] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 10:45:15 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3501.995750] usb usb9: usbfs: process 25494 (syz-executor1) did not claim interface 7 before use [ 3501.999984] netlink: 'syz-executor5': attribute type 29 has an invalid length. [ 3502.012884] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3502.034159] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 3502.081102] netlink: 'syz-executor5': attribute type 29 has an invalid length. 10:45:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x19b, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f0a}) [ 3502.138571] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 10:45:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xee0f0000000000) [ 3502.202640] netlink: 'syz-executor5': attribute type 29 has an invalid length. [ 3502.234268] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 3502.284408] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:15 executing program 5: syz_open_pts(0xffffffffffffffff, 0x0) socketpair(0x37, 0x3, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0x66, &(0x7f0000001600)={0x95c}, 0xc) r0 = msgget(0x3, 0x3fa) msgrcv(r0, &(0x7f0000000100)={0x0, ""/96}, 0x68, 0x3, 0x1000) 10:45:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3502.351364] usb usb9: usbfs: process 25513 (syz-executor1) did not claim interface 10 before use [ 3502.359256] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x19c, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:15 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f48}) 10:45:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x19d, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xf7ae57d87f0000) [ 3502.629803] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:15 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:15 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x19e, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f4c}) [ 3502.935205] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3502.997932] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2}) dup3(r0, r1, 0x0) 10:45:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x100000000000000) 10:45:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f60}) 10:45:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x19f, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:16 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3503.364295] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3503.375177] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1a0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f68}) 10:45:16 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x200000000000000) 10:45:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1a1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:16 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sched_getscheduler(r1) 10:45:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3503.694316] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f6c}) [ 3503.815162] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:16 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1a2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f74}) 10:45:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x300000000000000) [ 3504.077221] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:17 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1a3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:17 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3504.135613] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f7a}) 10:45:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xa9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3504.349846] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3504.408264] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0189436, &(0x7f0000000100)={0xa1, 0x3f00}) 10:45:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x400000000000000) 10:45:17 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1a4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x6300}) 10:45:17 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xaa, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3504.635722] usb usb9: usbfs: process 25696 (syz-executor1) did not claim interface 0 before use [ 3504.650639] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:17 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1a5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xab, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3504.706868] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3504.725746] usb usb9: usbfs: process 25696 (syz-executor1) did not claim interface 0 before use 10:45:17 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:17 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfff, 0x101000) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xac, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x500000000000000) 10:45:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x2}) 10:45:18 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1a6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3505.022738] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:18 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0000000000000000000000000000003f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3505.078200] usb usb9: usbfs: process 25736 (syz-executor1) did not claim interface 0 before use [ 3505.104055] libceph: connect [d::]:6640 error -101 [ 3505.116401] libceph: mon0 [d::]:6640 connect error 10:45:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xad, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x3}) 10:45:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x600000000000000) [ 3505.236045] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:18 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1a7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3505.293874] usb usb9: usbfs: process 25755 (syz-executor1) did not claim interface 0 before use [ 3505.323580] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xae, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x4}) [ 3505.544734] libceph: connect [d::]:6640 error -101 [ 3505.549956] libceph: mon0 [d::]:6640 connect error [ 3505.570255] usb usb9: usbfs: process 25778 (syz-executor1) did not claim interface 0 before use 10:45:18 executing program 5 (fault-call:3 fault-nth:0): openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:18 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:18 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1a8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xaf, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x700000000000000) 10:45:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x5}) 10:45:18 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3505.849932] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3505.865592] usb usb9: usbfs: process 25792 (syz-executor1) did not claim interface 0 before use 10:45:19 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1a9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3505.911221] FAULT_INJECTION: forcing a failure. [ 3505.911221] name failslab, interval 1, probability 0, space 0, times 0 10:45:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3506.006833] CPU: 0 PID: 25797 Comm: syz-executor5 Not tainted 5.0.0-rc2+ #34 [ 3506.014037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3506.023388] Call Trace: [ 3506.025982] dump_stack+0x1db/0x2d0 [ 3506.029615] ? dump_stack_print_info.cold+0x20/0x20 [ 3506.034649] ? proc_fail_nth_write+0xa0/0x220 [ 3506.039164] should_fail.cold+0xa/0x15 [ 3506.043056] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3506.048193] ? ___might_sleep+0x1e7/0x310 [ 3506.052354] ? arch_local_save_flags+0x50/0x50 [ 3506.056969] __should_failslab+0x121/0x190 [ 3506.061203] should_failslab+0x9/0x14 [ 3506.065026] __kmalloc_track_caller+0x2d8/0x740 [ 3506.069697] ? strncpy_from_user+0x4e0/0x4e0 [ 3506.074137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3506.079694] ? strndup_user+0x77/0xd0 [ 3506.083510] memdup_user+0x26/0xb0 [ 3506.087066] strndup_user+0x77/0xd0 [ 3506.090728] ksys_mount+0x3c/0x150 [ 3506.094294] __x64_sys_mount+0xbe/0x150 [ 3506.098288] do_syscall_64+0x1a3/0x800 [ 3506.102197] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3506.107140] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3506.112193] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3506.117061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3506.122246] RIP: 0033:0x458099 [ 3506.125435] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3506.144330] RSP: 002b:00007f950aa02c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 10:45:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x6}) [ 3506.152036] RAX: ffffffffffffffda RBX: 00007f950aa02c90 RCX: 0000000000458099 [ 3506.159299] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 3506.166580] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3506.173872] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f950aa036d4 [ 3506.181148] R13: 00000000004c3df1 R14: 00000000004d6da8 R15: 0000000000000003 [ 3506.234587] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3506.254417] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:19 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1aa, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3506.309089] usb usb9: usbfs: process 25814 (syz-executor1) did not claim interface 0 before use 10:45:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:19 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:19 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x7}) 10:45:19 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[.::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3506.483302] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3506.542454] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x800000000000000) 10:45:19 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1ab, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:19 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3506.616521] usb usb9: usbfs: process 25840 (syz-executor1) did not claim interface 0 before use 10:45:19 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1ac, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0xa}) [ 3506.720637] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:19 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x900000000000000) 10:45:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1ad, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3506.921615] usb usb9: usbfs: process 25871 (syz-executor1) did not claim interface 0 before use [ 3506.943261] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3506.963048] libceph: resolve '.' (ret=-3): failed 10:45:20 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3507.018445] libceph: parse_ips bad ip '[.::]:6640' 10:45:20 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[:::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x48}) [ 3507.174695] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1ae, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3507.225655] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3507.264316] usb usb9: usbfs: process 25902 (syz-executor1) did not claim interface 0 before use 10:45:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xa00000000000000) 10:45:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3507.295115] libceph: parse_ips bad ip '[:::]:6640' 10:45:20 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[]::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:20 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x4c}) 10:45:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1af, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3507.490770] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xb00000000000000) [ 3507.550473] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3507.550824] usb usb9: usbfs: process 25929 (syz-executor1) did not claim interface 0 before use 10:45:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1b0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:20 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:20 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d]:]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3507.639055] libceph: parse_ips bad ip '[]::]:6640' 10:45:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x60}) [ 3507.755250] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:20 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1b1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3507.833505] libceph: resolve 'd' (ret=-3): failed [ 3507.840077] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3507.864446] libceph: parse_ips bad ip '[d]:]:6640' [ 3507.870015] libceph: resolve 'd' (ret=-3): failed 10:45:20 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d:]]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3507.886906] libceph: parse_ips bad ip '[d]:]:6640' 10:45:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xc00000000000000) 10:45:21 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3507.978457] usb usb9: usbfs: process 25965 (syz-executor1) did not claim interface 0 before use 10:45:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1b2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x68}) [ 3508.125809] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3508.135317] libceph: resolve 'd' (ret=-3): failed [ 3508.142358] libceph: resolve 'd' (ret=-3): failed 10:45:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3508.170805] libceph: parse_ips bad ip '[d:]]:6640' 10:45:21 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::::6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3508.204516] libceph: parse_ips bad ip '[d:]]:6640' [ 3508.225652] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:21 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff000000000000000000000000000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xd00000000000000) 10:45:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1b3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3508.325250] usb usb9: usbfs: process 25997 (syz-executor1) did not claim interface 0 before use 10:45:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xb9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3508.422192] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x6c}) [ 3508.471471] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3508.500248] libceph: resolve 'd' (ret=-3): failed 10:45:21 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1b4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3508.550146] libceph: parse_ips bad ip '[d::::6640' 10:45:21 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::d:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xe00000000000000) [ 3508.621111] usb usb9: usbfs: process 26024 (syz-executor1) did not claim interface 0 before use [ 3508.656562] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xba, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x74}) [ 3508.709459] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3508.771610] libceph: parse_ips bad ip '[d::d:6640' 10:45:21 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1b5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:21 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3508.824443] libceph: parse_ips bad ip '[d::d:6640' 10:45:21 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]]6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3508.866143] usb usb9: usbfs: process 26056 (syz-executor1) did not claim interface 0 before use 10:45:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xbb, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xf00000000000000) [ 3508.984626] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3509.017453] libceph: parse_ips bad ip '[d::]]6640' 10:45:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x7a}) 10:45:22 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1b6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:22 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:66\t0:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3509.036620] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:22 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xbc, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3509.224753] usb usb9: usbfs: process 26081 (syz-executor1) did not claim interface 0 before use [ 3509.273500] libceph: parse_ips bad ip '[d::]:66 0' 10:45:22 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1b7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:22 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640]/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x300}) 10:45:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1000000000000000) [ 3509.302065] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3509.406751] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xbd, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:22 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3509.460150] usb usb9: usbfs: process 26110 (syz-executor1) did not claim interface 0 before use [ 3509.479212] ceph: device name is missing path (no : separator in [d::]:6640]/) 10:45:22 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x02', 0x0, 0x0) 10:45:22 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1b8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x500}) [ 3509.606083] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:22 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:22 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1b9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:22 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x04', 0x0, 0x0) [ 3509.723327] usb usb9: usbfs: process 26135 (syz-executor1) did not claim interface 0 before use 10:45:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xbe, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x600}) [ 3509.832940] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1100000000000000) 10:45:23 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1ba, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3509.915331] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:23 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\t', 0x0, 0x0) [ 3509.957333] usb usb9: usbfs: process 26154 (syz-executor1) did not claim interface 0 before use 10:45:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xbf, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x700}) 10:45:23 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:23 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\n', 0x0, 0x0) [ 3510.179675] usb usb9: usbfs: process 26182 (syz-executor1) did not claim interface 0 before use 10:45:23 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1bb, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0xa00}) 10:45:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1200000000000000) 10:45:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3510.266738] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3510.349473] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:23 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3510.425310] usb usb9: usbfs: process 26204 (syz-executor1) did not claim interface 0 before use 10:45:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:23 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\xf0', 0x0, 0x0) 10:45:23 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1bc, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3510.508973] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x2000}) 10:45:23 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:23 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1300000000000000) 10:45:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3510.738635] usb usb9: usbfs: process 26240 (syz-executor1) did not claim interface 0 before use 10:45:23 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:23 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1bd, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3510.788581] kernel msg: ebtables bug: please report to author: Hook order must be followed 10:45:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc3, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x3f00}) 10:45:23 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) [ 3510.894553] libceph: connect [d::]:6640 error -101 [ 3510.899725] libceph: mon0 [d::]:6640 connect error 10:45:24 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph ', 0x0, 0x0) 10:45:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1400000000000000) 10:45:24 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1be, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3511.024428] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3511.044630] usb usb9: usbfs: process 26284 (syz-executor1) did not claim interface 0 before use 10:45:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc4, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:24 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x4800}) 10:45:24 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 3511.287983] usb usb9: usbfs: process 26307 (syz-executor1) did not claim interface 0 before use 10:45:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc5, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:24 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1bf, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1500000000000000) 10:45:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x4c00}) 10:45:24 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x10', 0x0, 0x0) 10:45:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc6, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3511.541329] usb usb9: usbfs: process 26333 (syz-executor1) did not claim interface 0 before use [ 3511.559501] libceph: connect [d::]:6640 error -101 [ 3511.566998] libceph: mon0 [d::]:6640 connect error 10:45:24 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1c0, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:24 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x800002502000ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:6640:/', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 10:45:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x6000}) [ 3511.807670] usb usb9: usbfs: process 26359 (syz-executor1) did not claim interface 0 before use 10:45:25 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000"]}, 0x138) syz_open_dev$amidi(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 10:45:25 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1c1, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc7, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x6800}) 10:45:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1600000000000000) [ 3512.125317] usb usb9: usbfs: process 26373 (syz-executor1) did not claim interface 0 before use 10:45:25 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0x1c2, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x3f00, 0x6c00}) 10:45:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc8, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) 10:45:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x1700000000000000) 10:45:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000640), 0xc9, &(0x7f0000000180)=[{0x12, 0x84, 0x6}], 0x20}, 0x0) [ 3512.343241] usb usb9: usbfs: process 26391 (syz-executor1) did not claim interface 0 before use [ 3512.469796] usb usb9: usbfs: process 26391 (syz-executor1) did not claim interface 0 before use [ 3512.566685] IPVS: ftp: loaded support on port[0] = 21 [ 3512.574726] libceph: connect [d::]:6640 error -101 [ 3512.579752] libceph: mon0 [d::]:6640 connect error [ 3512.708426] chnl_net:caif_netlink_parms(): no params data found [ 3512.716465] device bridge_slave_1 left promiscuous mode [ 3512.721978] bridge0: port 2(bridge_slave_1) entered disabled state [ 3512.785296] device bridge_slave_0 left promiscuous mode [ 3512.790789] bridge0: port 1(bridge_slave_0) entered disabled state [ 3512.970439] device hsr_slave_1 left promiscuous mode [ 3513.038438] device hsr_slave_0 left promiscuous mode [ 3513.077300] team0 (unregistering): Port device team_slave_1 removed [ 3513.091236] team0 (unregistering): Port device team_slave_0 removed [ 3513.102659] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3513.150966] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3513.230723] bond0 (unregistering): Released all slaves [ 3513.377561] bridge0: port 1(bridge_slave_0) entered blocking state [ 3513.383948] bridge0: port 1(bridge_slave_0) entered disabled state [ 3513.391308] device bridge_slave_0 entered promiscuous mode [ 3513.398519] bridge0: port 2(bridge_slave_1) entered blocking state [ 3513.405160] bridge0: port 2(bridge_slave_1) entered disabled state [ 3513.411985] device bridge_slave_1 entered promiscuous mode [ 3513.430686] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3513.440461] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3513.457125] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3513.464691] team0: Port device team_slave_0 added [ 3513.470281] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3513.477641] team0: Port device team_slave_1 added [ 3513.482980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3513.490435] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3513.567611] device hsr_slave_0 entered promiscuous mode [ 3513.624496] device hsr_slave_1 entered promiscuous mode [ 3513.681072] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3513.688405] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3513.705254] bridge0: port 2(bridge_slave_1) entered blocking state [ 3513.711610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3513.718313] bridge0: port 1(bridge_slave_0) entered blocking state [ 3513.724738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3513.798899] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 3513.805910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3513.815604] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3513.826231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3513.833908] bridge0: port 1(bridge_slave_0) entered disabled state [ 3513.841162] bridge0: port 2(bridge_slave_1) entered disabled state [ 3513.849157] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3513.869602] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3513.876152] 8021q: adding VLAN 0 to HW filter on device team0 [ 3513.886012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3513.893652] bridge0: port 1(bridge_slave_0) entered blocking state [ 3513.900093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3513.926036] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3513.934012] bridge0: port 2(bridge_slave_1) entered blocking state [ 3513.940404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3513.949494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3513.957909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3513.972666] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3513.982801] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3513.999535] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3514.007926] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3514.016042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3514.023862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3514.038467] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3514.051743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3514.072366] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3514.152922] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 3514.564581] libceph: connect [d::]:6640 error -101 [ 3514.569613] libceph: mon0 [d::]:6640 connect error [ 3514.579580] libceph: connect [d::]:6640 error -101 [ 3514.584931] libceph: mon0 [d::]:6640 connect error [ 3515.604605] libceph: connect [d::]:6640 error -101 [ 3515.609690] libceph: mon0 [d::]:6640 connect error [ 3516.564652] libceph: connect [d::]:6640 error -101 [ 3516.569643] libceph: mon0 [d::]:6640 connect error [ 3517.604922] libceph: connect [d::]:6640 error -101 [ 3517.609939] libceph: mon0 [d::]:6640 connect error [ 3518.564572] libceph: connect [d::]:6640 error -101 [ 3518.569591] libceph: mon0 [d::]:6640 connect error [ 3519.604699] libceph: connect [d::]:6640 error -101 [ 3519.609832] libceph: mon0 [d::]:6640 connect error [ 3520.566189] libceph: connect [d::]:6640 error -101 [ 3520.571213] libceph: mon0 [d::]:6640 connect error [ 3521.604467] libceph: connect [d::]:6640 error -101 [ 3521.609488] libceph: mon0 [d::]:6640 connect error [ 3522.564714] libceph: connect [d::]:6640 error -101 [ 3522.569852] libceph: mon0 [d::]:6640 connect error [ 3523.604654] libceph: connect [d::]:6640 error -101 [ 3523.609713] libceph: mon0 [d::]:6640 connect error [ 3524.564677] libceph: connect [d::]:6640 error -101 [ 3524.569702] libceph: mon0 [d::]:6640 connect error [ 3525.604824] libceph: connect [d::]:6640 error -101 [ 3525.610022] libceph: mon0 [d::]:6640 connect error [ 3526.565838] libceph: connect [d::]:6640 error -101 [ 3526.570865] libceph: mon0 [d::]:6640 connect error [ 3527.604582] libceph: connect [d::]:6640 error -101 [ 3527.609777] libceph: mon0 [d::]:6640 connect error [ 3528.564763] libceph: connect [d::]:6640 error -101 [ 3528.569830] libceph: mon0 [d::]:6640 connect error [ 3529.604682] libceph: connect [d::]:6640 error -101 [ 3529.609809] libceph: mon0 [d::]:6640 connect error [ 3530.564470] libceph: connect [d::]:6640 error -101 [ 3530.569474] libceph: mon0 [d::]:6640 connect error [ 3531.604588] libceph: connect [d::]:6640 error -101 [ 3531.609700] libceph: mon0 [d::]:6640 connect error [ 3532.565182] libceph: connect [d::]:6640 error -101 [ 3532.570318] libceph: mon0 [d::]:6640 connect error [ 3533.604542] libceph: connect [d::]:6640 error -101 [ 3533.609875] libceph: mon0 [d::]:6640 connect error [ 3534.564500] libceph: connect [d::]:6640 error -101 [ 3534.569695] libceph: mon0 [d::]:6640 connect error [ 3535.604599] libceph: connect [d::]:6640 error -101 [ 3535.609728] libceph: mon0 [d::]:6640 connect error [ 3536.564514] libceph: connect [d::]:6640 error -101 [ 3536.569527] libceph: mon0 [d::]:6640 connect error [ 3537.604608] libceph: connect [d::]:6640 error -101 [ 3537.609751] libceph: mon0 [d::]:6640 connect error [ 3538.565659] libceph: connect [d::]:6640 error -101 [ 3538.570879] libceph: mon0 [d::]:6640 connect error [ 3539.604529] libceph: connect [d::]:6640 error -101 [ 3539.609537] libceph: mon0 [d::]:6640 connect error [ 3540.564512] libceph: connect [d::]:6640 error -101 [ 3540.569700] libceph: mon0 [d::]:6640 connect error [ 3541.605412] libceph: connect [d::]:6640 error -101 [ 3541.610603] libceph: mon0 [d::]:6640 connect error [ 3542.564633] libceph: connect [d::]:6640 error -101 [ 3542.569671] libceph: mon0 [d::]:6640 connect error [ 3543.604813] libceph: connect [d::]:6640 error -101 [ 3543.609849] libceph: mon0 [d::]:6640 connect error [ 3544.565394] libceph: connect [d::]:6640 error -101 [ 3544.570544] libceph: mon0 [d::]:6640 connect error [ 3545.604562] libceph: connect [d::]:6640 error -101 [ 3545.609634] libceph: mon0 [d::]:6640 connect error [ 3546.567496] libceph: connect [d::]:6640 error -101 [ 3546.572515] libceph: mon0 [d::]:6640 connect error [ 3547.604838] libceph: connect [d::]:6640 error -101 [ 3547.610096] libceph: mon0 [d::]:6640 connect error [ 3548.564559] libceph: connect [d::]:6640 error -101 [ 3548.569742] libceph: mon0 [d::]:6640 connect error [ 3549.604605] libceph: connect [d::]:6640 error -101 [ 3549.609710] libceph: mon0 [d::]:6640 connect error [ 3550.565288] libceph: connect [d::]:6640 error -101 [ 3550.570285] libceph: mon0 [d::]:6640 connect error [ 3551.604594] libceph: connect [d::]:6640 error -101 [ 3551.609669] libceph: mon0 [d::]:6640 connect error [ 3552.564759] libceph: connect [d::]:6640 error -101 [ 3552.569800] libceph: mon0 [d::]:6640 connect error [ 3553.604546] libceph: connect [d::]:6640 error -101 [ 3553.609554] libceph: mon0 [d::]:6640 connect error [ 3554.564618] libceph: connect [d::]:6640 error -101 [ 3554.569796] libceph: mon0 [d::]:6640 connect error [ 3555.604517] libceph: connect [d::]:6640 error -101 [ 3555.609523] libceph: mon0 [d::]:6640 connect error [ 3556.565453] libceph: connect [d::]:6640 error -101 [ 3556.570460] libceph: mon0 [d::]:6640 connect error [ 3557.604545] libceph: connect [d::]:6640 error -101 [ 3557.609685] libceph: mon0 [d::]:6640 connect error [ 3558.564694] libceph: connect [d::]:6640 error -101 [ 3558.569764] libceph: mon0 [d::]:6640 connect error [ 3559.604867] libceph: connect [d::]:6640 error -101 [ 3559.610024] libceph: mon0 [d::]:6640 connect error [ 3560.564720] libceph: connect [d::]:6640 error -101 [ 3560.569763] libceph: mon0 [d::]:6640 connect error [ 3561.604732] libceph: connect [d::]:6640 error -101 [ 3561.609818] libceph: mon0 [d::]:6640 connect error [ 3562.566479] libceph: connect [d::]:6640 error -101 [ 3562.571543] libceph: mon0 [d::]:6640 connect error [ 3563.604915] libceph: connect [d::]:6640 error -101 [ 3563.609953] libceph: mon0 [d::]:6640 connect error [ 3564.564717] libceph: connect [d::]:6640 error -101 [ 3564.569780] libceph: mon0 [d::]:6640 connect error [ 3565.604704] libceph: connect [d::]:6640 error -101 [ 3565.609851] libceph: mon0 [d::]:6640 connect error [ 3566.564660] libceph: connect [d::]:6640 error -101 [ 3566.569704] libceph: mon0 [d::]:6640 connect error [ 3567.604688] libceph: connect [d::]:6640 error -101 [ 3567.609734] libceph: mon0 [d::]:6640 connect error [ 3568.565826] libceph: connect [d::]:6640 error -101 [ 3568.570980] libceph: mon0 [d::]:6640 connect error [ 3569.604635] libceph: connect [d::]:6640 error -101 [ 3569.609675] libceph: mon0 [d::]:6640 connect error [ 3570.564520] libceph: connect [d::]:6640 error -101 [ 3570.569700] libceph: mon0 [d::]:6640 connect error [ 3571.604526] libceph: connect [d::]:6640 error -101 [ 3571.609578] libceph: mon0 [d::]:6640 connect error [ 3571.788871] libceph: connect [d::]:6640 error -101 [ 3571.793903] libceph: mon0 [d::]:6640 connect error [ 3571.810718] libceph: connect [d::]:6640 error -101 [ 3571.817559] libceph: mon0 [d::]:6640 connect error [ 3571.823286] WARNING: CPU: 1 PID: 26329 at net/ceph/messenger.c:3073 clear_standby+0x12f/0x160 [ 3571.832276] Kernel panic - not syncing: panic_on_warn set ... [ 3571.838163] CPU: 1 PID: 26329 Comm: syz-executor5 Not tainted 5.0.0-rc2+ #34 [ 3571.845333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3571.854772] Call Trace: [ 3571.857355] dump_stack+0x1db/0x2d0 [ 3571.860983] ? dump_stack_print_info.cold+0x20/0x20 [ 3571.865982] ? preempt_schedule_common+0x4f/0xe0 [ 3571.870870] ? clear_standby+0x70/0x160 [ 3571.874835] panic+0x2cb/0x65c [ 3571.878014] ? add_taint.cold+0x16/0x16 [ 3571.881973] ? clear_standby+0x12f/0x160 [ 3571.886018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3571.891552] ? __probe_kernel_read+0x1f4/0x250 [ 3571.896299] ? __warn.cold+0x5/0x48 [ 3571.899922] ? __warn+0xe8/0x1d0 [ 3571.903388] ? clear_standby+0x12f/0x160 [ 3571.907442] __warn.cold+0x20/0x48 [ 3571.910976] ? clear_standby+0x12f/0x160 [ 3571.915023] report_bug+0x263/0x2b0 [ 3571.918633] do_error_trap+0x11b/0x200 [ 3571.922517] do_invalid_op+0x37/0x50 [ 3571.926338] ? clear_standby+0x12f/0x160 [ 3571.930556] invalid_op+0x14/0x20 [ 3571.933993] RIP: 0010:clear_standby+0x12f/0x160 [ 3571.938668] Code: de e8 f5 3e bb f9 48 85 db 0f 84 39 ff ff ff e8 47 3d bb f9 0f 0b e9 2d ff ff ff e8 1b 2e ff f9 e9 67 ff ff ff e8 31 3d bb f9 <0f> 0b eb a5 e8 28 2e ff f9 e9 f6 fe ff ff 4c 89 ef e8 1b 2e ff f9 [ 3571.957548] RSP: 0018:ffff88805506f6d0 EFLAGS: 00010293 [ 3571.962890] RAX: ffff888085830640 RBX: ffff88809e3490e8 RCX: ffffffff87c6c163 [ 3571.970142] RDX: 0000000000000000 RSI: ffffffff87c6c1bf RDI: 0000000000000007 [ 3571.977392] RBP: ffff88805506f6e8 R08: ffff888085830640 R09: ffffed1013c6924e [ 3571.984668] R10: ffff88805506f6e8 R11: ffff88809e34926f R12: 0000000000000001 [ 3571.991922] R13: ffff88809e349220 R14: ffff88805506f798 R15: ffff88809e349268 [ 3571.999187] ? clear_standby+0xd3/0x160 [ 3572.003163] ? clear_standby+0x12f/0x160 [ 3572.007235] ceph_con_send+0x450/0x610 [ 3572.011194] ? ceph_msg_new+0x40/0x40 [ 3572.014981] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3572.020500] __send_prepared_auth_request+0x155/0x1b0 [ 3572.025737] __open_session+0x3d9/0x570 [ 3572.029834] ceph_monc_open_session+0x1a2/0x360 [ 3572.034580] __ceph_open_session+0xe2/0x7e0 [ 3572.038894] ? bdi_register_va+0x4c/0x80 [ 3572.042935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3572.048456] ? ceph_destroy_client+0x1a0/0x1a0 [ 3572.053034] ? kill_block_super+0x100/0x100 [ 3572.057375] ? ceph_put_super+0x70/0x70 [ 3572.061332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3572.067075] ? ns_capable_common+0x141/0x170 [ 3572.071479] ceph_mount+0x10d2/0x1c80 [ 3572.075266] ? ceph_compare_super+0x510/0x510 [ 3572.079742] ? m_stop+0x20/0x20 [ 3572.083004] ? __get_fs_type+0x9a/0xd0 [ 3572.086873] ? find_held_lock+0x35/0x120 [ 3572.090913] mount_fs+0x123/0x43a [ 3572.094348] ? emergency_thaw_all+0x260/0x260 [ 3572.098824] ? lock_release+0xc40/0xc40 [ 3572.102793] ? digsig_verify.cold+0x32/0x32 [ 3572.107114] vfs_kern_mount.part.0+0xdb/0x570 [ 3572.111599] ? may_umount+0xb0/0xb0 [ 3572.115211] ? _raw_read_unlock+0x2d/0x50 [ 3572.119356] ? __get_fs_type+0x9a/0xd0 [ 3572.123231] do_mount+0x58e/0x3330 [ 3572.126753] ? lock_release+0xc40/0xc40 [ 3572.130717] ? copy_mount_string+0x40/0x40 [ 3572.135548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3572.141192] ? _copy_from_user+0xdd/0x150 [ 3572.145328] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3572.150847] ? copy_mount_options+0x30e/0x440 [ 3572.155322] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3572.160850] ksys_mount+0xdb/0x150 [ 3572.164396] __x64_sys_mount+0xbe/0x150 [ 3572.168354] do_syscall_64+0x1a3/0x800 [ 3572.172225] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3572.177144] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 3572.182163] ? __switch_to_asm+0x34/0x70 [ 3572.186208] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3572.191043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3572.196231] RIP: 0033:0x458099 [ 3572.199411] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3572.218297] RSP: 002b:00007f950aa02c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3572.225988] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 3572.233243] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 3572.240492] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3572.247784] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f950aa036d4 [ 3572.255045] R13: 00000000004c3df1 R14: 00000000004d6da8 R15: 00000000ffffffff [ 3572.263527] Kernel Offset: disabled [ 3572.267488] Rebooting in 86400 seconds..