r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:26 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x3f00}) 22:56:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2976.067875] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2976.096556] kernel msg: ebtables bug: please report to author: bad policy 22:56:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2976.137274] kernel msg: ebtables bug: please report to author: bad policy [ 2976.140800] usb usb9: usbfs: process 3679 (syz-executor5) did not claim interface 2 before use [ 2976.160888] usb usb9: usbfs: process 3687 (syz-executor4) did not claim interface 2 before use [ 2976.178619] usb usb9: usbfs: process 3680 (syz-executor3) did not claim interface 0 before use [ 2976.195171] usb usb9: usbfs: process 3690 (syz-executor5) did not claim interface 2 before use 22:56:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x6000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2976.240936] usb usb9: usbfs: process 3695 (syz-executor3) did not claim interface 0 before use 22:56:26 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4000}) [ 2976.294366] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2976.316190] kernel msg: ebtables bug: please report to author: bad policy 22:56:26 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1a1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2976.360317] kernel msg: ebtables bug: please report to author: bad policy [ 2976.426312] usb usb9: usbfs: process 3715 (syz-executor3) did not claim interface 0 before use 22:56:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x7000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2976.475227] usb usb9: usbfs: process 3717 (syz-executor4) did not claim interface 2 before use [ 2976.496226] kernel msg: ebtables bug: please report to author: bad policy 22:56:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:26 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4800}) [ 2976.535537] kernel msg: ebtables bug: please report to author: bad policy [ 2976.542503] usb usb9: usbfs: process 3719 (syz-executor5) did not claim interface 2 before use [ 2976.559818] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:26 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1a2}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2976.661453] usb usb9: usbfs: process 3738 (syz-executor3) did not claim interface 0 before use 22:56:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2976.731046] usb usb9: usbfs: process 3744 (syz-executor4) did not claim interface 2 before use [ 2976.771930] kernel msg: ebtables bug: please report to author: bad policy [ 2976.784051] usb usb9: usbfs: process 3745 (syz-executor3) did not claim interface 0 before use 22:56:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0xa000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:26 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4c00}) 22:56:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2976.819835] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2976.833850] usb usb9: usbfs: process 3756 (syz-executor5) did not claim interface 2 before use [ 2976.843666] kernel msg: ebtables bug: please report to author: bad policy 22:56:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:27 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1a3}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2976.970860] usb usb9: usbfs: process 3771 (syz-executor4) did not claim interface 2 before use [ 2977.027313] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2977.061592] kernel msg: ebtables bug: please report to author: bad policy 22:56:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:27 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6000}) 22:56:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x20000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2977.093574] kernel msg: ebtables bug: please report to author: bad policy [ 2977.108093] usb usb9: usbfs: process 3782 (syz-executor5) did not claim interface 2 before use [ 2977.128562] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2977.253135] usb usb9: usbfs: process 3801 (syz-executor4) did not claim interface 2 before use 22:56:27 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1a4}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2977.297706] usb usb9: usbfs: process 3798 (syz-executor3) did not claim interface 0 before use [ 2977.309801] kernel msg: ebtables bug: please report to author: bad policy [ 2977.317494] usb usb9: usbfs: process 3805 (syz-executor5) did not claim interface 2 before use 22:56:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2977.358752] usb usb9: usbfs: process 3811 (syz-executor5) did not claim interface 2 before use 22:56:27 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6800}) 22:56:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x3f000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2977.525982] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2977.537960] kernel msg: ebtables bug: please report to author: bad policy [ 2977.549148] usb usb9: usbfs: process 3826 (syz-executor4) did not claim interface 2 before use 22:56:27 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1a5}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2977.592576] kernel msg: ebtables bug: please report to author: bad policy 22:56:27 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6c00}) [ 2977.638484] usb usb9: usbfs: process 3832 (syz-executor3) did not claim interface 0 before use 22:56:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x48000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2977.760637] usb usb9: usbfs: process 3836 (syz-executor5) did not claim interface 2 before use [ 2977.772648] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2977.796535] usb usb9: usbfs: process 3843 (syz-executor4) did not claim interface 2 before use 22:56:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2977.832446] usb usb9: usbfs: process 3844 (syz-executor5) did not claim interface 2 before use [ 2977.856632] kernel msg: ebtables bug: please report to author: bad policy 22:56:28 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7400}) 22:56:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2977.905322] kernel msg: ebtables bug: please report to author: bad policy 22:56:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x4c000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2977.962018] usb usb9: usbfs: process 3864 (syz-executor3) did not claim interface 0 before use 22:56:28 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1a6}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2978.003571] usb usb9: usbfs: process 3872 (syz-executor5) did not claim interface 2 before use [ 2978.005922] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2978.031122] usb usb9: usbfs: process 3875 (syz-executor4) did not claim interface 2 before use 22:56:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:28 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7a00}) [ 2978.177804] usb usb9: usbfs: process 3882 (syz-executor3) did not claim interface 0 before use [ 2978.216714] kernel msg: ebtables bug: please report to author: bad policy 22:56:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2978.226935] usb usb9: usbfs: process 3887 (syz-executor5) did not claim interface 2 before use [ 2978.246143] kernel msg: ebtables bug: please report to author: bad policy [ 2978.265616] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x60000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2978.288199] usb usb9: usbfs: process 3899 (syz-executor4) did not claim interface 2 before use [ 2978.333110] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:28 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x1000000}) [ 2978.380957] usb usb9: usbfs: process 3906 (syz-executor3) did not claim interface 0 before use [ 2978.420825] usb usb9: usbfs: process 3900 (syz-executor5) did not claim interface 2 before use 22:56:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:28 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1a7}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x68000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2978.447183] kernel msg: ebtables bug: please report to author: bad policy [ 2978.564131] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2978.612258] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2978.623455] usb usb9: usbfs: process 3927 (syz-executor4) did not claim interface 2 before use [ 2978.644293] usb usb9: usbfs: process 3931 (syz-executor5) did not claim interface 2 before use 22:56:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:28 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x2000000}) [ 2978.671767] usb usb9: usbfs: process 3925 (syz-executor3) did not claim interface 0 before use [ 2978.719323] kernel msg: ebtables bug: please report to author: bad policy 22:56:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x6c000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2978.766546] kernel msg: ebtables bug: please report to author: bad policy 22:56:29 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1a8}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2978.821179] usb usb9: usbfs: process 3949 (syz-executor4) did not claim interface 2 before use [ 2978.845895] usb usb9: usbfs: process 3951 (syz-executor5) did not claim interface 2 before use 22:56:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2978.886051] usb usb9: usbfs: process 3958 (syz-executor5) did not claim interface 2 before use [ 2978.895777] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2978.928636] kernel msg: ebtables bug: please report to author: bad policy 22:56:29 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x3000000}) [ 2978.997942] kernel msg: ebtables bug: please report to author: bad policy 22:56:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2979.053975] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2979.077082] usb usb9: usbfs: process 3971 (syz-executor5) did not claim interface 2 before use [ 2979.129053] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2979.155174] usb usb9: usbfs: process 3980 (syz-executor4) did not claim interface 2 before use 22:56:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:29 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1a9}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2979.175948] kernel msg: ebtables bug: please report to author: bad policy [ 2979.198726] usb usb9: usbfs: process 3983 (syz-executor5) did not claim interface 2 before use 22:56:29 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4000000}) 22:56:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2979.352255] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2979.421071] usb usb9: usbfs: process 4002 (syz-executor4) did not claim interface 2 before use 22:56:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x74000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:30 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x5000000}) 22:56:30 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1aa}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2980.041871] usb usb9: usbfs: process 4012 (syz-executor5) did not claim interface 2 before use [ 2980.056992] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2980.075639] usb usb9: usbfs: process 4018 (syz-executor5) did not claim interface 2 before use 22:56:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2980.096315] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2980.109831] usb usb9: usbfs: process 4017 (syz-executor4) did not claim interface 2 before use 22:56:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:30 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6000000}) [ 2980.210716] usb usb9: usbfs: process 4026 (syz-executor5) did not claim interface 2 before use 22:56:30 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ab}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2980.274804] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2980.287417] usb usb9: usbfs: process 4032 (syz-executor5) did not claim interface 2 before use 22:56:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2980.335975] usb usb9: usbfs: process 4037 (syz-executor4) did not claim interface 2 before use [ 2980.448746] usb usb9: usbfs: process 4044 (syz-executor5) did not claim interface 2 before use [ 2980.496036] IPVS: ftp: loaded support on port[0] = 21 [ 2980.504821] usb usb9: usbfs: process 4049 (syz-executor5) did not claim interface 2 before use [ 2980.521575] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2980.602793] IPVS: ftp: loaded support on port[0] = 21 [ 2980.710951] chnl_net:caif_netlink_parms(): no params data found [ 2980.769507] bridge0: port 1(bridge_slave_0) entered blocking state [ 2980.776018] bridge0: port 1(bridge_slave_0) entered disabled state [ 2980.782917] device bridge_slave_0 entered promiscuous mode [ 2980.793423] bridge0: port 2(bridge_slave_1) entered blocking state [ 2980.799971] bridge0: port 2(bridge_slave_1) entered disabled state [ 2980.807446] device bridge_slave_1 entered promiscuous mode [ 2980.841184] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2980.852190] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2980.882727] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2980.890057] team0: Port device team_slave_0 added [ 2980.927770] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2980.937960] team0: Port device team_slave_1 added [ 2980.971921] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2980.981017] chnl_net:caif_netlink_parms(): no params data found [ 2980.992441] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2981.068588] device hsr_slave_0 entered promiscuous mode [ 2981.114657] device hsr_slave_1 entered promiscuous mode [ 2981.184916] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2981.209120] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2981.229153] bridge0: port 1(bridge_slave_0) entered blocking state [ 2981.235688] bridge0: port 1(bridge_slave_0) entered disabled state [ 2981.242661] device bridge_slave_0 entered promiscuous mode [ 2981.250236] bridge0: port 2(bridge_slave_1) entered blocking state [ 2981.256733] bridge0: port 2(bridge_slave_1) entered disabled state [ 2981.263719] device bridge_slave_1 entered promiscuous mode [ 2981.292684] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2981.302768] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2981.323070] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2981.331637] team0: Port device team_slave_0 added [ 2981.344361] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2981.351461] team0: Port device team_slave_1 added [ 2981.359444] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2981.371112] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2981.378734] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2981.388131] device bridge_slave_1 left promiscuous mode [ 2981.393664] bridge0: port 2(bridge_slave_1) entered disabled state [ 2981.414858] device bridge_slave_0 left promiscuous mode [ 2981.420326] bridge0: port 1(bridge_slave_0) entered disabled state [ 2981.466430] device bridge_slave_1 left promiscuous mode [ 2981.471950] bridge0: port 2(bridge_slave_1) entered disabled state [ 2981.515583] device bridge_slave_0 left promiscuous mode [ 2981.521035] bridge0: port 1(bridge_slave_0) entered disabled state [ 2981.678357] device hsr_slave_1 left promiscuous mode [ 2981.730231] device hsr_slave_0 left promiscuous mode [ 2981.807490] team0 (unregistering): Port device team_slave_1 removed [ 2981.820673] team0 (unregistering): Port device team_slave_0 removed [ 2981.831519] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2981.892162] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2981.989916] bond0 (unregistering): Released all slaves [ 2982.166321] device hsr_slave_1 left promiscuous mode [ 2982.217603] device hsr_slave_0 left promiscuous mode [ 2982.257878] team0 (unregistering): Port device team_slave_1 removed [ 2982.272713] team0 (unregistering): Port device team_slave_0 removed [ 2982.285613] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2982.348487] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2982.447344] bond0 (unregistering): Released all slaves [ 2982.615953] device hsr_slave_0 entered promiscuous mode [ 2982.694447] device hsr_slave_1 entered promiscuous mode [ 2982.764922] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2982.772068] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2982.802040] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2982.828702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2982.838393] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2982.848092] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2982.857208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2982.867163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2982.886814] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2982.892878] 8021q: adding VLAN 0 to HW filter on device team0 [ 2982.902061] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2982.910490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2982.918518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2982.926456] bridge0: port 1(bridge_slave_0) entered blocking state [ 2982.932801] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2982.940113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2982.962614] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2982.974012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2982.980736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2982.981230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2982.996980] bridge0: port 2(bridge_slave_1) entered blocking state [ 2983.003321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2983.012984] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2983.022895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2983.039767] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2983.048587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2983.058819] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2983.067757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2983.076451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2983.084715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2983.093070] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2983.102378] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2983.111678] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2983.118144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2983.126416] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2983.133896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2983.141302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2983.150607] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2983.158451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2983.166507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2983.178541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2983.187446] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2983.193511] 8021q: adding VLAN 0 to HW filter on device team0 [ 2983.202947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2983.210700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2983.220663] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2983.227461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2983.316326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2983.324650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2983.332753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2983.340821] bridge0: port 1(bridge_slave_0) entered blocking state [ 2983.347241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2983.354496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2983.367272] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2983.375273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2983.383235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2983.391076] bridge0: port 2(bridge_slave_1) entered blocking state [ 2983.397453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2983.410501] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2983.418135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2983.428044] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2983.437574] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2983.445201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2983.458295] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2983.468033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2983.475574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2983.483564] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2983.495454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2983.506755] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2983.513764] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2983.521623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2983.530105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2983.544136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2983.553039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2983.570128] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2983.580626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2983.589051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2983.598833] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2983.611092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2983.649787] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2983.699365] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2983.755178] usb usb9: usbfs: process 4066 (syz-executor3) did not claim interface 0 before use [ 2983.774478] usb usb9: usbfs: process 4070 (syz-executor3) did not claim interface 0 before use 22:56:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x7a000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:34 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7000000}) 22:56:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:34 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ac}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2983.833910] kernel msg: ebtables bug: please report to author: bad policy [ 2983.858960] kernel msg: ebtables bug: please report to author: bad policy 22:56:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2983.899187] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2983.922408] usb usb9: usbfs: process 4083 (syz-executor5) did not claim interface 2 before use [ 2983.970818] usb usb9: usbfs: process 4091 (syz-executor4) did not claim interface 2 before use [ 2983.997289] usb usb9: usbfs: process 4092 (syz-executor3) did not claim interface 0 before use 22:56:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2984.026977] usb usb9: usbfs: process 4094 (syz-executor5) did not claim interface 2 before use [ 2984.037920] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2984.054706] usb usb9: usbfs: process 4091 (syz-executor4) did not claim interface 2 before use [ 2984.094520] usb usb9: usbfs: process 4101 (syz-executor3) did not claim interface 0 before use [ 2984.107757] kernel msg: ebtables bug: please report to author: bad policy 22:56:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:34 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0xa000000}) 22:56:34 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ad}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2984.136706] kernel msg: ebtables bug: please report to author: bad policy 22:56:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x100000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2984.258842] usb usb9: usbfs: process 4119 (syz-executor4) did not claim interface 2 before use 22:56:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2984.313748] usb usb9: usbfs: process 4124 (syz-executor5) did not claim interface 2 before use [ 2984.325100] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2984.330882] kernel msg: ebtables bug: please report to author: bad policy 22:56:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x200000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:34 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x20000000}) 22:56:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2984.382309] kernel msg: ebtables bug: please report to author: bad policy 22:56:34 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ae}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2984.524918] usb usb9: usbfs: process 4143 (syz-executor4) did not claim interface 2 before use [ 2984.559153] usb usb9: usbfs: process 4140 (syz-executor3) did not claim interface 0 before use 22:56:34 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x3f000000}) [ 2984.586143] usb usb9: usbfs: process 4147 (syz-executor5) did not claim interface 2 before use [ 2984.593129] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2984.617269] kernel msg: ebtables bug: please report to author: bad policy 22:56:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2984.638494] usb usb9: usbfs: process 4152 (syz-executor3) did not claim interface 0 before use [ 2984.650656] kernel msg: ebtables bug: please report to author: bad policy [ 2984.676203] usb usb9: usbfs: process 4157 (syz-executor5) did not claim interface 2 before use 22:56:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2984.757488] usb usb9: usbfs: process 4166 (syz-executor4) did not claim interface 2 before use 22:56:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x300000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2984.851575] kernel msg: ebtables bug: please report to author: bad policy 22:56:35 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1af}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x40000000}) 22:56:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2984.892353] usb usb9: usbfs: process 4177 (syz-executor5) did not claim interface 2 before use [ 2984.894675] kernel msg: ebtables bug: please report to author: bad policy [ 2984.913435] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2984.987508] usb usb9: usbfs: process 4186 (syz-executor5) did not claim interface 2 before use 22:56:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2985.077055] usb usb9: usbfs: process 4191 (syz-executor3) did not claim interface 0 before use [ 2985.109242] kernel msg: ebtables bug: please report to author: bad policy 22:56:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x400000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2985.158760] usb usb9: usbfs: process 4202 (syz-executor3) did not claim interface 0 before use 22:56:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x48000000}) [ 2985.209315] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2985.249179] usb usb9: usbfs: process 4209 (syz-executor5) did not claim interface 2 before use 22:56:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:35 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1b0}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2985.329639] usb usb9: usbfs: process 4216 (syz-executor4) did not claim interface 2 before use 22:56:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2985.379720] kernel msg: ebtables bug: please report to author: bad policy 22:56:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4c000000}) [ 2985.434600] usb usb9: usbfs: process 4224 (syz-executor3) did not claim interface 0 before use [ 2985.526401] usb usb9: usbfs: process 4229 (syz-executor3) did not claim interface 0 before use [ 2985.560120] usb usb9: usbfs: process 4232 (syz-executor5) did not claim interface 2 before use 22:56:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x500000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2985.595300] kernel msg: ebtables bug: please report to author: bad policy [ 2985.609612] usb usb9: usbfs: process 4240 (syz-executor5) did not claim interface 2 before use 22:56:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2985.646226] usb usb9: usbfs: process 4242 (syz-executor4) did not claim interface 2 before use [ 2985.667194] kernel msg: ebtables bug: please report to author: bad policy 22:56:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x60000000}) 22:56:35 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1b1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2985.785553] usb usb9: usbfs: process 4248 (syz-executor3) did not claim interface 0 before use [ 2985.876209] usb usb9: usbfs: process 4261 (syz-executor3) did not claim interface 0 before use [ 2985.900898] usb usb9: usbfs: process 4260 (syz-executor4) did not claim interface 2 before use 22:56:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x3}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x600000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2985.922839] kernel msg: ebtables bug: please report to author: bad policy 22:56:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2985.969957] kernel msg: ebtables bug: please report to author: bad policy 22:56:36 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x68000000}) [ 2986.151530] usb usb9: usbfs: process 4278 (syz-executor4) did not claim interface 2 before use [ 2986.219299] kernel msg: ebtables bug: please report to author: bad policy [ 2986.232664] usb usb9: usbfs: process 4286 (syz-executor3) did not claim interface 0 before use [ 2986.247566] kernel msg: ebtables bug: please report to author: bad policy 22:56:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:36 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1b2}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:36 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6c000000}) 22:56:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x700000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0xa00000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2986.885816] usb usb9: usbfs: process 4298 (syz-executor3) did not claim interface 0 before use [ 2986.887737] kernel msg: ebtables bug: please report to author: bad policy [ 2986.901863] usb usb9: usbfs: process 4303 (syz-executor4) did not claim interface 2 before use [ 2986.921809] usb usb9: usbfs: process 4304 (syz-executor3) did not claim interface 0 before use 22:56:37 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x74000000}) [ 2987.042815] kernel msg: ebtables bug: please report to author: bad policy [ 2987.065659] usb usb9: usbfs: process 4314 (syz-executor3) did not claim interface 0 before use [ 2987.089410] kernel msg: ebtables bug: please report to author: bad policy [ 2987.103066] usb usb9: usbfs: process 4319 (syz-executor4) did not claim interface 2 before use 22:56:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:37 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1b3}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2987.134624] usb usb9: usbfs: process 4321 (syz-executor3) did not claim interface 0 before use 22:56:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x2000000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2987.248499] IPVS: ftp: loaded support on port[0] = 21 [ 2987.304630] usb usb9: usbfs: process 4333 (syz-executor3) did not claim interface 0 before use [ 2987.321793] kernel msg: ebtables bug: please report to author: bad policy [ 2987.351937] kernel msg: ebtables bug: please report to author: bad policy [ 2987.377852] usb usb9: usbfs: process 4345 (syz-executor3) did not claim interface 0 before use [ 2987.470873] IPVS: ftp: loaded support on port[0] = 21 [ 2987.615220] chnl_net:caif_netlink_parms(): no params data found [ 2987.701887] bridge0: port 1(bridge_slave_0) entered blocking state [ 2987.708363] bridge0: port 1(bridge_slave_0) entered disabled state [ 2987.715778] device bridge_slave_0 entered promiscuous mode [ 2987.722422] chnl_net:caif_netlink_parms(): no params data found [ 2987.730628] bridge0: port 2(bridge_slave_1) entered blocking state [ 2987.737097] bridge0: port 2(bridge_slave_1) entered disabled state [ 2987.744099] device bridge_slave_1 entered promiscuous mode [ 2987.806281] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2987.822153] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2987.829861] bridge0: port 1(bridge_slave_0) entered blocking state [ 2987.837231] bridge0: port 1(bridge_slave_0) entered disabled state [ 2987.844110] device bridge_slave_0 entered promiscuous mode [ 2987.864720] bridge0: port 2(bridge_slave_1) entered blocking state [ 2987.871124] bridge0: port 2(bridge_slave_1) entered disabled state [ 2987.882123] device bridge_slave_1 entered promiscuous mode [ 2987.903192] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2987.911942] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2987.919734] team0: Port device team_slave_0 added [ 2987.938723] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2987.948413] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2987.955896] team0: Port device team_slave_1 added [ 2987.967452] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2987.976113] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2988.002586] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2988.009809] team0: Port device team_slave_0 added [ 2988.015559] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2988.022998] team0: Port device team_slave_1 added [ 2988.034735] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2988.097261] device hsr_slave_0 entered promiscuous mode [ 2988.164425] device hsr_slave_1 entered promiscuous mode [ 2988.215016] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2988.232212] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2988.239754] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2988.273265] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2988.327184] device hsr_slave_0 entered promiscuous mode [ 2988.404596] device hsr_slave_1 entered promiscuous mode [ 2988.453803] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2988.461312] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2988.500593] bridge0: port 2(bridge_slave_1) entered blocking state [ 2988.506982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2988.513616] bridge0: port 1(bridge_slave_0) entered blocking state [ 2988.520044] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2988.557399] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2988.563462] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2988.573626] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2988.587282] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2988.595132] bridge0: port 1(bridge_slave_0) entered disabled state [ 2988.602232] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2988.610216] bridge0: port 2(bridge_slave_1) entered disabled state [ 2988.620545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2988.628180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2988.645564] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2988.651622] 8021q: adding VLAN 0 to HW filter on device team0 [ 2988.662883] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2988.686064] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2988.692115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2988.699369] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2988.706865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2988.715036] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2988.722643] bridge0: port 1(bridge_slave_0) entered blocking state [ 2988.729011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2988.751099] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2988.758945] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2988.766605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2988.774617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2988.782158] bridge0: port 2(bridge_slave_1) entered blocking state [ 2988.788542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2988.797926] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2988.811129] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2988.831112] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2988.838823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2988.847414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2988.854801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2988.864042] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2988.874374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2988.882886] device bridge_slave_1 left promiscuous mode [ 2988.888550] bridge0: port 2(bridge_slave_1) entered disabled state [ 2988.945445] device bridge_slave_0 left promiscuous mode [ 2988.951035] bridge0: port 1(bridge_slave_0) entered disabled state [ 2989.006511] device bridge_slave_1 left promiscuous mode [ 2989.011984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2989.074894] device bridge_slave_0 left promiscuous mode [ 2989.080301] bridge0: port 1(bridge_slave_0) entered disabled state [ 2989.277880] device hsr_slave_1 left promiscuous mode [ 2989.329886] device hsr_slave_0 left promiscuous mode [ 2989.389939] team0 (unregistering): Port device team_slave_1 removed [ 2989.401962] team0 (unregistering): Port device team_slave_0 removed [ 2989.414300] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2989.478577] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2989.559315] bond0 (unregistering): Released all slaves [ 2989.718230] device hsr_slave_1 left promiscuous mode [ 2989.779915] device hsr_slave_0 left promiscuous mode [ 2989.820487] team0 (unregistering): Port device team_slave_1 removed [ 2989.831584] team0 (unregistering): Port device team_slave_0 removed [ 2989.842666] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2989.888761] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2989.980759] bond0 (unregistering): Released all slaves [ 2990.071611] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2990.081673] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2990.087972] 8021q: adding VLAN 0 to HW filter on device team0 [ 2990.094759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2990.102600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2990.111073] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2990.125063] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2990.133669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2990.141744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2990.151638] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2990.162708] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2990.171283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2990.179775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2990.187547] bridge0: port 1(bridge_slave_0) entered blocking state [ 2990.193887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2990.200876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2990.208748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2990.221353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2990.231040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2990.242588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2990.250911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2990.258761] bridge0: port 2(bridge_slave_1) entered blocking state [ 2990.265168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2990.272427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2990.280095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2990.295057] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2990.302667] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2990.309499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2990.317356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2990.329953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2990.340304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2990.352909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2990.364589] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2990.371195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2990.380682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2990.388798] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2990.400521] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2990.409317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2990.417343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2990.427300] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2990.435248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2990.442879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2990.454684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2990.463633] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2990.477809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2990.491898] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2990.501974] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2990.509697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 22:56:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:40 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7a000000}) 22:56:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:40 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1b4}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x3f00000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2990.621800] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2990.639940] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2990.649814] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2990.751147] usb usb9: usbfs: process 4369 (syz-executor4) did not claim interface 2 before use [ 2990.767282] kernel msg: ebtables bug: please report to author: bad policy [ 2990.776833] usb usb9: usbfs: process 4374 (syz-executor3) did not claim interface 0 before use [ 2990.778422] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2990.825897] usb usb9: usbfs: process 4381 (syz-executor3) did not claim interface 0 before use 22:56:41 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x100000000000000}) [ 2990.902654] usb usb9: usbfs: process 4384 (syz-executor5) did not claim interface 2 before use [ 2990.980832] kernel msg: ebtables bug: please report to author: bad policy [ 2990.989165] usb usb9: usbfs: process 4398 (syz-executor5) did not claim interface 2 before use [ 2990.998819] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2991.020609] kernel msg: ebtables bug: please report to author: bad policy 22:56:41 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1b5}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x5}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x4800000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2991.028741] usb usb9: usbfs: process 4399 (syz-executor4) did not claim interface 2 before use 22:56:41 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x200000000000000}) [ 2991.100785] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2991.146252] usb usb9: usbfs: process 4408 (syz-executor3) did not claim interface 0 before use 22:56:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x4c00000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2991.205089] kernel msg: ebtables bug: please report to author: bad policy [ 2991.244601] usb usb9: usbfs: process 4418 (syz-executor5) did not claim interface 2 before use 22:56:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2991.258414] kernel msg: ebtables bug: please report to author: bad policy [ 2991.294740] usb usb9: usbfs: process 4424 (syz-executor4) did not claim interface 2 before use 22:56:41 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1b6}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:41 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x300000000000000}) [ 2991.349764] usb usb9: usbfs: process 4428 (syz-executor3) did not claim interface 0 before use [ 2991.376169] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2991.454084] usb usb9: usbfs: process 4440 (syz-executor3) did not claim interface 0 before use [ 2991.478741] kernel msg: ebtables bug: please report to author: bad policy [ 2991.480528] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x6000000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2991.497243] usb usb9: usbfs: process 4444 (syz-executor5) did not claim interface 2 before use 22:56:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2991.555445] usb usb9: usbfs: process 4443 (syz-executor4) did not claim interface 2 before use 22:56:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:41 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x400000000000000}) [ 2991.610422] kernel msg: ebtables bug: please report to author: bad policy [ 2991.620141] usb usb9: usbfs: process 4456 (syz-executor3) did not claim interface 0 before use [ 2991.649357] usb usb9: usbfs: process 4463 (syz-executor5) did not claim interface 2 before use [ 2991.692142] usb usb9: usbfs: process 4468 (syz-executor3) did not claim interface 0 before use 22:56:41 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1b7}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2991.774282] kernel msg: ebtables bug: please report to author: bad policy [ 2991.782318] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2991.804920] usb usb9: usbfs: process 4478 (syz-executor4) did not claim interface 2 before use 22:56:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x6800000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2991.888373] usb usb9: usbfs: process 4485 (syz-executor5) did not claim interface 2 before use 22:56:42 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x500000000000000}) 22:56:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0xa}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2991.978419] usb usb9: usbfs: process 4488 (syz-executor3) did not claim interface 0 before use [ 2992.001823] kernel msg: ebtables bug: please report to author: bad policy 22:56:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x6c00000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2992.066706] usb usb9: usbfs: process 4504 (syz-executor4) did not claim interface 2 before use [ 2992.103154] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:42 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1b8}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2992.124880] usb usb9: usbfs: process 4513 (syz-executor5) did not claim interface 2 before use 22:56:42 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x600000000000000}) [ 2992.185390] kernel msg: ebtables bug: please report to author: bad policy [ 2992.196437] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x48}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2992.241652] kernel msg: ebtables bug: please report to author: bad policy [ 2992.254578] usb usb9: usbfs: process 4523 (syz-executor3) did not claim interface 0 before use 22:56:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2992.305731] usb usb9: usbfs: process 4531 (syz-executor4) did not claim interface 2 before use [ 2992.352549] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2992.371162] usb usb9: usbfs: process 4535 (syz-executor5) did not claim interface 2 before use [ 2992.383033] usb usb9: usbfs: process 4533 (syz-executor3) did not claim interface 0 before use 22:56:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x7400000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:42 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1b9}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2992.409182] kernel msg: ebtables bug: please report to author: bad policy [ 2992.421453] usb usb9: usbfs: process 4547 (syz-executor5) did not claim interface 2 before use [ 2992.442340] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:42 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x700000000000000}) 22:56:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4c}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2992.506631] usb usb9: usbfs: process 4552 (syz-executor3) did not claim interface 0 before use [ 2992.574521] kernel msg: ebtables bug: please report to author: bad policy [ 2992.582399] usb usb9: usbfs: process 4567 (syz-executor3) did not claim interface 0 before use 22:56:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x7a00000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2992.617923] kernel msg: ebtables bug: please report to author: bad policy [ 2992.626076] usb usb9: usbfs: process 4571 (syz-executor5) did not claim interface 2 before use [ 2992.646397] usb usb9: usbfs: process 4576 (syz-executor5) did not claim interface 2 before use 22:56:42 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0xa00000000000000}) 22:56:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x60}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:42 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ba}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2992.779197] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2992.796444] usb usb9: usbfs: process 4586 (syz-executor3) did not claim interface 0 before use 22:56:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x2}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2992.846003] kernel msg: ebtables bug: please report to author: bad policy [ 2992.854622] usb usb9: usbfs: process 4592 (syz-executor4) did not claim interface 2 before use 22:56:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2992.896904] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2992.923504] usb usb9: usbfs: process 4607 (syz-executor5) did not claim interface 2 before use 22:56:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x68}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2992.973120] usb usb9: usbfs: process 4610 (syz-executor3) did not claim interface 0 before use 22:56:43 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x2000000000000000}) [ 2993.028995] usb usb9: usbfs: process 4615 (syz-executor3) did not claim interface 0 before use 22:56:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x3}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:43 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1bb}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2993.081091] kernel msg: ebtables bug: please report to author: bad policy [ 2993.114030] usb usb9: usbfs: process 4621 (syz-executor5) did not claim interface 2 before use 22:56:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2993.142389] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2993.153208] usb usb9: usbfs: process 4626 (syz-executor4) did not claim interface 2 before use 22:56:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6c}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2993.238250] usb usb9: usbfs: process 4633 (syz-executor5) did not claim interface 2 before use [ 2993.261620] usb usb9: usbfs: process 4641 (syz-executor3) did not claim interface 0 before use [ 2993.272131] kernel msg: ebtables bug: please report to author: bad policy 22:56:43 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x3f00000000000000}) 22:56:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2993.318565] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2993.352743] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:43 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1bc}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2993.414716] usb usb9: usbfs: process 4650 (syz-executor5) did not claim interface 2 before use 22:56:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x4}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2993.486721] usb usb9: usbfs: process 4668 (syz-executor5) did not claim interface 2 before use [ 2993.487347] kernel msg: ebtables bug: please report to author: bad policy 22:56:43 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4000000000000000}) 22:56:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2993.532565] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x74}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2993.621808] usb usb9: usbfs: process 4679 (syz-executor3) did not claim interface 0 before use 22:56:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x5}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:43 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4800000000000000}) 22:56:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7a}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2993.720139] usb usb9: usbfs: process 4688 (syz-executor5) did not claim interface 2 before use [ 2993.731436] kernel msg: ebtables bug: please report to author: bad policy [ 2993.743694] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:43 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1bd}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2993.848231] usb usb9: usbfs: process 4705 (syz-executor3) did not claim interface 0 before use [ 2993.893276] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2993.918580] usb usb9: usbfs: process 4715 (syz-executor4) did not claim interface 2 before use 22:56:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x6}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2993.937773] usb usb9: usbfs: process 4709 (syz-executor3) did not claim interface 0 before use [ 2993.948486] kernel msg: ebtables bug: please report to author: bad policy [ 2993.962356] usb usb9: usbfs: process 4719 (syz-executor5) did not claim interface 2 before use 22:56:44 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4c00000000000000}) 22:56:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x300}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2994.006965] usb usb9: usbfs: process 4724 (syz-executor5) did not claim interface 2 before use [ 2994.029884] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2994.076708] usb usb9: usbfs: process 4730 (syz-executor3) did not claim interface 0 before use 22:56:44 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1be}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2994.152328] usb usb9: usbfs: process 4739 (syz-executor3) did not claim interface 0 before use [ 2994.201150] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2994.214536] usb usb9: usbfs: process 4737 (syz-executor4) did not claim interface 2 before use [ 2994.231855] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x7}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2994.243176] usb usb9: usbfs: process 4743 (syz-executor5) did not claim interface 2 before use 22:56:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2994.298442] usb usb9: usbfs: process 4755 (syz-executor5) did not claim interface 2 before use [ 2994.325539] kernel msg: ebtables bug: please report to author: bad policy 22:56:44 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6000000000000000}) 22:56:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x500}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0xa}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2994.345280] usb usb9: usbfs: process 4759 (syz-executor3) did not claim interface 0 before use [ 2994.366032] usb usb9: usbfs: process 4762 (syz-executor3) did not claim interface 0 before use 22:56:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2994.424844] usb usb9: usbfs: process 4766 (syz-executor4) did not claim interface 2 before use 22:56:44 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6800000000000000}) 22:56:44 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1bf}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x48}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2994.539391] usb usb9: usbfs: process 4782 (syz-executor3) did not claim interface 0 before use [ 2994.575769] kernel msg: ebtables bug: please report to author: bad policy [ 2994.600929] usb usb9: usbfs: process 4793 (syz-executor4) did not claim interface 2 before use [ 2994.621037] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2994.642152] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2994.666457] usb usb9: usbfs: process 4790 (syz-executor5) did not claim interface 2 before use [ 2994.712784] usb usb9: usbfs: process 4805 (syz-executor5) did not claim interface 2 before use 22:56:44 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6c00000000000000}) [ 2994.759053] usb usb9: usbfs: process 4802 (syz-executor3) did not claim interface 0 before use [ 2994.785152] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2994.832558] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2994.851913] usb usb9: usbfs: process 4813 (syz-executor4) did not claim interface 2 before use [ 2994.855603] kernel msg: ebtables bug: please report to author: bad policy 22:56:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x4c}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x600}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:45 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1c0}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2994.892366] usb usb9: usbfs: process 4821 (syz-executor3) did not claim interface 0 before use 22:56:45 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7400000000000000}) 22:56:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2995.013920] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2995.043716] usb usb9: usbfs: process 4836 (syz-executor3) did not claim interface 0 before use 22:56:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x700}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2995.106409] usb usb9: usbfs: process 4834 (syz-executor5) did not claim interface 2 before use 22:56:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x60}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2995.149646] usb usb9: usbfs: process 4843 (syz-executor4) did not claim interface 2 before use 22:56:45 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1c1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:45 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7a00000000000000}) [ 2995.235823] usb usb9: usbfs: process 4849 (syz-executor3) did not claim interface 0 before use 22:56:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x68}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 2995.288929] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2995.343151] usb usb9: usbfs: process 4856 (syz-executor5) did not claim interface 2 before use [ 2995.359738] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2995.375796] usb usb9: usbfs: process 4862 (syz-executor4) did not claim interface 2 before use 22:56:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 2995.405192] usb usb9: usbfs: process 4867 (syz-executor5) did not claim interface 2 before use 22:56:45 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:56:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x6c}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0xa00}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2995.555533] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:45 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1c2}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2995.601526] usb usb9: usbfs: process 4879 (syz-executor4) did not claim interface 2 before use [ 2995.629008] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2995.641812] usb usb9: usbfs: process 4884 (syz-executor4) did not claim interface 2 before use [ 2995.675658] usb usb9: usbfs: process 4886 (syz-executor5) did not claim interface 2 before use [ 2995.724721] usb usb9: usbfs: process 4889 (syz-executor5) did not claim interface 2 before use 22:56:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x2000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:46 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1c3}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:46 executing program 4: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x800) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000008c0)=""/180, &(0x7f0000000100)=0xfffffffffffffe02) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x100000001, 0x7, &(0x7f0000000500)=[{&(0x7f0000000080), 0x0, 0x81}, {&(0x7f0000000140)="ea002fcedd70ccb2dacc9ca04ac22e8dc7fe92f92c349d6479e572afad41e26b9fa24dfa4e8050da92f03ea1946efc3ba1336042f85cc8e9ed33395fe63c37d8cf4f965e181b1b0e0f82151d6853360a2d21c5466775c1cbb8cff6b88014d628023cea1f639ba47dfc767445a5cd84fc956d771437678b338f86745915a9916f8a5635a89280f346c6876675ec67723c77889fe8220d2794d64ae78267ca357dd78f4ff1d02845ffd87520e4f0d46428361adc112bbc970a0abb43bf9b3d0d1c2d5b", 0xc2, 0x8da}, {&(0x7f0000000240)="55f2080627a0b47872f98558025295a6ea8e3352d9402344d67c234f4585962e20d3122fe896a1137d2c9637aa146ae92b0a5bf361fb4dced427152f49df7c1217da1dc3b735e9cad0c4ea6041d064601c0b42a8b7b3179156de417f5810ca7f4a67308bb6641394bbe53b4599afe3977e709e4a710161df888eed3df1464cd979b47b70956bd47394bf1bd478f47b0c51aaf2bce2f299", 0x97, 0x4}, {&(0x7f0000000300)="e7ab0ed74a0f73d336ada9a79f5cf6d9f2b2c87557213ec128c68e03aa565ea80a78ce2ce2b0346c0e1885e0db0c50cbc8e9e20f25691864183fce765af235472de8dd54f17a8dd4ccd66ea747077a50ba51edc84767a617b28806bb81712c99", 0x60, 0x7}, {&(0x7f0000000380)="7286fdcc77eb64b2f009b62f9609c2608ae55db6eb3bb6139a8606c05626fc8abf825cc5710cd26836031ecaa7589e608480f36229d187417059a9994f39c4a2e59e817e1f0bcba9ce12a83990fc3a01af3b2c883a3308e880ebe4134d1cfe522fdcb35023732b3a85c1050bcd293e2e3e07049d556e8ad841cd61cedc5a81798d2ee27319b1d5c8533329f079766671c43ab2e36072f6a11594c6ce8037b9bb74ecc5fbd1e37006240f94edf043", 0xae, 0x3c}, {&(0x7f0000000440)="4d347b8720c5b1f8549f04212356ec988a9808f0b50505b200caca2634a1eeea8e65e8303d1919528addab80b5904212c1", 0x31, 0x8000}, {&(0x7f0000000480)="f42f711324447eee965f1f71c5dcd51e2ceaef91ee10f8a0f232d082bc1652e41b197dbfbeb1ec1865f61da1d3804b0072076ade7f1200fa1deed0f6d3fe8bd9b153850b71e448891af4f32ecf8fb83d96acb0f934db428430f4e6a76c6620ce37a4843b90810a1c66679a419724dab627ad260e93365b7e", 0x78, 0x10000}], 0x3180020, &(0x7f00000007c0)=ANY=[@ANYBLOB="696f636861727365743d63703836332c636865636b3d72656c617865642c6d61703d6e6f726d616c2c7365636c6162656c2c7065726d69745f646972658660696f2c646566636f6e746578743d73797374656d5f752c00a76bc59c67326b617560ab204273a21ad9a7cb031c6fa0437214d296fea404f7afc014de9862"]) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000880)={0xa1, 0x2, 0x0, 0x1, 0xfffffffffffffff9}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/capi/capi20\x00', 0x400001, 0x0) write$P9_RCREATE(r1, &(0x7f0000000640)={0x18, 0x73, 0x2, {{0x2, 0x1, 0x7}, 0x5}}, 0x18) 22:56:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4800}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2996.305601] usb usb9: usbfs: process 4898 (syz-executor5) did not claim interface 2 before use [ 2996.338491] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:46 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x8, 0x10001}) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:56:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x74}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:46 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1c4}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 2996.483203] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2996.511411] usb usb9: usbfs: process 4925 (syz-executor5) did not claim interface 2 before use 22:56:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4c00}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 2996.576306] usb usb9: usbfs: process 4929 (syz-executor5) did not claim interface 2 before use 22:56:46 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0x9, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 2996.672567] IPVS: ftp: loaded support on port[0] = 21 [ 2996.718315] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2996.780620] usb usb9: usbfs: process 4943 (syz-executor4) did not claim interface 2 before use [ 2996.793784] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2996.819312] usb usb9: usbfs: process 4947 (syz-executor5) did not claim interface 2 before use 22:56:47 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1c5}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:47 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) mq_timedsend(r0, &(0x7f0000000000)="d7524089b02899f2a561e65c3112ff62fb1a96e75e588721bf5845177c74d040bb12e9917031e99fb0e31cb619823ec4fdc93275b2957155985942bd509af9c124866fe7a3a21f0811d93272e5c1f2cec6646533bb4d863043e7435b7465e53f621f9595c990e3f4d1c0d792e059dce0aec0b528dac78722321f1192dacc62fa7a82176a94d355b52e5643640167937ba3ff89f4fef5c049c3db", 0x9a, 0x8, &(0x7f0000000140)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x100, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f00000001c0)='security.SMACK64EXEC\x00', &(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x15, 0x1) [ 2996.840904] IPVS: ftp: loaded support on port[0] = 21 [ 2996.846135] usb usb9: usbfs: process 4950 (syz-executor4) did not claim interface 2 before use [ 2996.857274] usb usb9: usbfs: process 4951 (syz-executor5) did not claim interface 2 before use [ 2996.958038] usb usb9: usbfs: process 4957 (syz-executor4) did not claim interface 2 before use [ 2996.996715] usb usb9: usbfs: process 4957 (syz-executor4) did not claim interface 2 before use [ 2997.022867] usb usb9: usbfs: process 4963 (syz-executor5) did not claim interface 2 before use [ 2997.061888] usb usb9: usbfs: process 4967 (syz-executor5) did not claim interface 2 before use [ 2997.216290] chnl_net:caif_netlink_parms(): no params data found [ 2997.318620] bridge0: port 1(bridge_slave_0) entered blocking state [ 2997.325560] bridge0: port 1(bridge_slave_0) entered disabled state [ 2997.332527] device bridge_slave_0 entered promiscuous mode [ 2997.343235] bridge0: port 2(bridge_slave_1) entered blocking state [ 2997.349743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2997.357328] device bridge_slave_1 entered promiscuous mode [ 2997.381906] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2997.397733] chnl_net:caif_netlink_parms(): no params data found [ 2997.408121] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2997.454309] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2997.461556] team0: Port device team_slave_0 added [ 2997.492460] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2997.501379] team0: Port device team_slave_1 added [ 2997.507206] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2997.518250] bridge0: port 1(bridge_slave_0) entered blocking state [ 2997.524955] bridge0: port 1(bridge_slave_0) entered disabled state [ 2997.532329] device bridge_slave_0 entered promiscuous mode [ 2997.539382] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2997.558179] bridge0: port 2(bridge_slave_1) entered blocking state [ 2997.566349] bridge0: port 2(bridge_slave_1) entered disabled state [ 2997.573280] device bridge_slave_1 entered promiscuous mode [ 2997.658194] device hsr_slave_0 entered promiscuous mode [ 2997.704752] device hsr_slave_1 entered promiscuous mode [ 2997.756725] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2997.775986] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2997.783895] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2997.799893] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2997.813891] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2997.821629] team0: Port device team_slave_0 added [ 2997.827409] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2997.834928] team0: Port device team_slave_1 added [ 2997.840280] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2997.848264] device bridge_slave_1 left promiscuous mode [ 2997.853787] bridge0: port 2(bridge_slave_1) entered disabled state [ 2997.905031] device bridge_slave_0 left promiscuous mode [ 2997.910463] bridge0: port 1(bridge_slave_0) entered disabled state [ 2997.966389] device bridge_slave_1 left promiscuous mode [ 2997.971945] bridge0: port 2(bridge_slave_1) entered disabled state [ 2998.014995] device bridge_slave_0 left promiscuous mode [ 2998.020416] bridge0: port 1(bridge_slave_0) entered disabled state [ 2998.256581] device hsr_slave_1 left promiscuous mode [ 2998.309832] device hsr_slave_0 left promiscuous mode [ 2998.351541] team0 (unregistering): Port device team_slave_1 removed [ 2998.362911] team0 (unregistering): Port device team_slave_0 removed [ 2998.377967] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2998.422585] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2998.496007] bond0 (unregistering): Released all slaves [ 2998.660761] device hsr_slave_1 left promiscuous mode [ 2998.708722] device hsr_slave_0 left promiscuous mode [ 2998.767964] team0 (unregistering): Port device team_slave_1 removed [ 2998.781444] team0 (unregistering): Port device team_slave_0 removed [ 2998.792509] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2998.858416] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2998.957531] bond0 (unregistering): Released all slaves [ 2999.060053] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2999.147610] device hsr_slave_0 entered promiscuous mode [ 2999.185436] device hsr_slave_1 entered promiscuous mode [ 2999.254992] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2999.262375] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2999.278491] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2999.295796] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2999.353411] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2999.365673] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2999.382768] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2999.397606] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2999.409398] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2999.417109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2999.423955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2999.434245] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2999.440316] 8021q: adding VLAN 0 to HW filter on device team0 [ 2999.450361] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2999.458435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2999.465886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2999.474245] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2999.481367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2999.489747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2999.498041] bridge0: port 1(bridge_slave_0) entered blocking state [ 2999.504457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2999.511979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2999.532541] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2999.540383] 8021q: adding VLAN 0 to HW filter on device team0 [ 2999.550858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2999.561076] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2999.569938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2999.578563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2999.586509] bridge0: port 2(bridge_slave_1) entered blocking state [ 2999.592879] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2999.599907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2999.611778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2999.622265] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2999.629563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2999.638121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2999.646208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2999.653875] bridge0: port 1(bridge_slave_0) entered blocking state [ 2999.660296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2999.670073] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2999.682893] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2999.690140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2999.698905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2999.707083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2999.714863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2999.722564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2999.730497] bridge0: port 2(bridge_slave_1) entered blocking state [ 2999.736910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2999.743922] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2999.754260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2999.787380] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2999.797245] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2999.804776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2999.812829] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2999.820673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2999.829179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2999.888054] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2999.895787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2999.903453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2999.913780] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2999.923990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2999.932912] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2999.943879] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2999.950536] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2999.964412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2999.972538] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2999.980779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2999.989299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2999.997620] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3000.007384] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3000.015588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3000.023705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3000.047631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3000.059947] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3000.071367] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3000.078013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3000.086936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3000.102999] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3000.123999] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3000.143534] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3000.213019] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3000.237279] kernel msg: ebtables bug: please report to author: bad policy [ 3000.256382] kernel msg: ebtables bug: please report to author: bad policy 22:56:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:50 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000000)={0x3, 0x3, 0x10001, 0x0, 0x34e, 0x5, 0x9}) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x10, "3142ed"}, 0x5, 0x3) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:56:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6800}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3000.311384] usb usb9: usbfs: process 4986 (syz-executor5) did not claim interface 2 before use [ 3000.323077] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3000.377453] usb usb9: usbfs: process 4991 (syz-executor4) did not claim interface 2 before use [ 3000.404617] usb usb9: usbfs: process 4992 (syz-executor3) did not claim interface 0 before use 22:56:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x7a}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:50 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1c6}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6c00}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:50 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3000.448792] kernel msg: ebtables bug: please report to author: bad policy [ 3000.470758] usb usb9: usbfs: process 4999 (syz-executor3) did not claim interface 0 before use [ 3000.481651] kernel msg: ebtables bug: please report to author: bad policy 22:56:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3000.543481] usb usb9: usbfs: process 5010 (syz-executor4) did not claim interface 2 before use [ 3000.583013] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3000.604685] usb usb9: usbfs: process 5012 (syz-executor5) did not claim interface 2 before use [ 3000.621436] kernel msg: ebtables bug: please report to author: bad policy [ 3000.632635] usb usb9: usbfs: process 5021 (syz-executor4) did not claim interface 2 before use 22:56:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3000.663358] kernel msg: ebtables bug: please report to author: bad policy [ 3000.681642] usb usb9: usbfs: process 5026 (syz-executor5) did not claim interface 2 before use 22:56:50 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1c7}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3000.736117] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3000.787072] kernel msg: ebtables bug: please report to author: bad policy [ 3000.798573] usb usb9: usbfs: process 5032 (syz-executor3) did not claim interface 0 before use 22:56:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7400}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:51 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0xc200) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) [ 3000.847671] kernel msg: ebtables bug: please report to author: bad policy 22:56:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x300}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3000.971078] usb usb9: usbfs: process 5049 (syz-executor5) did not claim interface 2 before use [ 3001.007605] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7a00}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3001.031310] usb usb9: usbfs: process 5059 (syz-executor5) did not claim interface 2 before use [ 3001.059031] kernel msg: ebtables bug: please report to author: bad policy [ 3001.072311] usb usb9: usbfs: process 5063 (syz-executor3) did not claim interface 0 before use 22:56:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:51 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000000)=""/142) [ 3001.119632] usb usb9: usbfs: process 5069 (syz-executor5) did not claim interface 2 before use 22:56:51 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1c8}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3001.170062] usb usb9: usbfs: process 5072 (syz-executor3) did not claim interface 0 before use [ 3001.203332] usb usb9: usbfs: process 5075 (syz-executor5) did not claim interface 2 before use 22:56:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x500}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3001.240951] kernel msg: ebtables bug: please report to author: bad policy [ 3001.266744] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3001.278905] usb usb9: usbfs: process 5083 (syz-executor4) did not claim interface 2 before use 22:56:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x1000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3001.384693] usb usb9: usbfs: process 5092 (syz-executor3) did not claim interface 0 before use [ 3001.425362] usb usb9: usbfs: process 5083 (syz-executor4) did not claim interface 2 before use [ 3001.440876] kernel msg: ebtables bug: please report to author: bad policy 22:56:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:51 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1c9}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3001.469878] usb usb9: usbfs: process 5104 (syz-executor3) did not claim interface 0 before use [ 3001.488102] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x600}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3001.522924] usb usb9: usbfs: process 5105 (syz-executor5) did not claim interface 2 before use 22:56:51 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7ff, 0xa, 0x1, 0x4, "f284e812164f616c26b3860f25578156914012651c43cf68df60ca68a71944535ffedb2e460ed0e5b60cdcdd3db6f60a74e1c62d2ce569d4e409e31b0fe981b1", "b1f913c69a0ec6cb22f111b6c1ce4bf5ade28981d0853f3f89ffe3397c8b474d", [0x1fd9f564, 0x63]}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000001200)=""/4096, &(0x7f0000001140)=0x1000) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) prctl$PR_GET_DUMPABLE(0x3) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000500)=0xe8) bind$xdp(r0, &(0x7f0000000540)={0x2c, 0x5, r1, 0x19, r0}, 0x10) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x7, 0x81, 0x2, 0x236, 0x8, [{0x100000000, 0x3, 0x4, 0x0, 0x0, 0x400}, {0x49, 0x5, 0x1, 0x0, 0x0, 0x100}, {0x8, 0x10000, 0x3, 0x0, 0x0, 0x400}, {0xffff, 0x0, 0x1, 0x0, 0x0, 0x2000}, {0x7, 0x96f8, 0x7fff, 0x0, 0x0, 0x1000}, {0x7, 0x7, 0x6, 0x0, 0x0, 0x8}, {0x80000000, 0x3b3, 0xa3, 0x0, 0x0, 0x2}, {0x8, 0x401, 0x10000, 0x0, 0x0, 0x408}]}) 22:56:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3001.619726] usb usb9: usbfs: process 5123 (syz-executor5) did not claim interface 2 before use [ 3001.644836] kernel msg: ebtables bug: please report to author: bad policy [ 3001.705236] usb usb9: usbfs: process 5129 (syz-executor3) did not claim interface 0 before use [ 3001.721667] usb usb9: usbfs: process 5128 (syz-executor4) did not claim interface 2 before use 22:56:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x2000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:51 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ca}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3001.756788] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3001.769382] usb usb9: usbfs: process 5135 (syz-executor3) did not claim interface 0 before use 22:56:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x700}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3001.850358] kernel msg: ebtables bug: please report to author: bad policy [ 3001.867360] usb usb9: usbfs: process 5142 (syz-executor4) did not claim interface 2 before use [ 3001.890771] usb usb9: usbfs: process 5149 (syz-executor5) did not claim interface 2 before use 22:56:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3001.907391] kernel msg: ebtables bug: please report to author: bad policy 22:56:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3001.947724] usb usb9: usbfs: process 5155 (syz-executor5) did not claim interface 2 before use 22:56:52 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) getdents64(r0, &(0x7f0000000140)=""/237, 0xed) [ 3002.016303] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3002.032286] usb usb9: usbfs: process 5165 (syz-executor3) did not claim interface 0 before use [ 3002.059218] kernel msg: ebtables bug: please report to author: bad policy [ 3002.091649] kernel msg: ebtables bug: please report to author: bad policy 22:56:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:52 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1cb}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3002.120952] usb usb9: usbfs: process 5173 (syz-executor4) did not claim interface 2 before use 22:56:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x3000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3002.178741] usb usb9: usbfs: process 5178 (syz-executor3) did not claim interface 0 before use [ 3002.236575] usb usb9: usbfs: process 5181 (syz-executor4) did not claim interface 2 before use [ 3002.276344] usb usb9: usbfs: process 5190 (syz-executor5) did not claim interface 2 before use 22:56:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0xa00}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3002.276460] kernel msg: ebtables bug: please report to author: bad policy 22:56:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3002.330705] usb usb9: usbfs: process 5194 (syz-executor5) did not claim interface 2 before use 22:56:52 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40001000001, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:56:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x2000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3002.450789] usb usb9: usbfs: process 5202 (syz-executor3) did not claim interface 0 before use 22:56:52 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1cc}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:52 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3002.539063] kernel msg: ebtables bug: please report to author: bad policy [ 3002.604541] kernel msg: ebtables bug: please report to author: bad policy [ 3002.611542] usb usb9: usbfs: process 5213 (syz-executor5) did not claim interface 2 before use 22:56:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3002.653650] usb usb9: usbfs: process 5221 (syz-executor3) did not claim interface 0 before use [ 3002.696663] usb usb9: usbfs: process 5224 (syz-executor5) did not claim interface 2 before use [ 3002.732952] usb usb9: usbfs: process 5229 (syz-executor3) did not claim interface 0 before use 22:56:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x5000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:52 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xe5bb, 0x18000) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3002.840082] kernel msg: ebtables bug: please report to author: bad policy 22:56:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3002.889218] kernel msg: ebtables bug: please report to author: bad policy [ 3002.901548] usb usb9: usbfs: process 5241 (syz-executor5) did not claim interface 2 before use [ 3003.030041] kernel msg: ebtables bug: please report to author: bad policy [ 3003.058994] kernel msg: ebtables bug: please report to author: bad policy 22:56:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:53 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1cd}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x3f00}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:53 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x4000000000004) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) dup3(r0, r0, 0x80000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x28840, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x34200, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x101000, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) ptrace$setsig(0x4203, r3, 0x4f, &(0x7f00000001c0)={0x14, 0x7fbd, 0xffffffffffffffc1}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000240)={{0x3, 0x3, 0x100000001, 0x1, 0x7c}, 0x5, 0x9}) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000140)={0x1}) connect$unix(r0, &(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) 22:56:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x71, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x7fffffff, 0x80080) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x5, 0x40000) [ 3003.553882] usb usb9: usbfs: process 5268 (syz-executor5) did not claim interface 2 before use [ 3003.555889] kernel msg: ebtables bug: please report to author: bad policy 22:56:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3003.617299] kernel msg: ebtables bug: please report to author: bad policy [ 3003.625995] usb usb9: usbfs: process 5276 (syz-executor3) did not claim interface 0 before use 22:56:53 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x4800}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:53 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ce}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3003.746101] usb usb9: usbfs: process 5283 (syz-executor5) did not claim interface 2 before use 22:56:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0xa000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3003.887587] kernel msg: ebtables bug: please report to author: bad policy [ 3003.946965] usb usb9: usbfs: process 5298 (syz-executor5) did not claim interface 2 before use [ 3003.982725] IPVS: ftp: loaded support on port[0] = 21 [ 3003.996209] usb usb9: usbfs: process 5297 (syz-executor3) did not claim interface 0 before use [ 3004.049735] usb usb9: usbfs: process 5307 (syz-executor3) did not claim interface 0 before use [ 3004.245258] chnl_net:caif_netlink_parms(): no params data found [ 3004.297796] bridge0: port 1(bridge_slave_0) entered blocking state [ 3004.305186] bridge0: port 1(bridge_slave_0) entered disabled state [ 3004.312151] device bridge_slave_0 entered promiscuous mode [ 3004.319511] bridge0: port 2(bridge_slave_1) entered blocking state [ 3004.326026] bridge0: port 2(bridge_slave_1) entered disabled state [ 3004.333011] device bridge_slave_1 entered promiscuous mode [ 3004.353874] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3004.363163] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3004.383010] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3004.390620] team0: Port device team_slave_0 added [ 3004.396030] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3004.403179] team0: Port device team_slave_1 added [ 3004.408706] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3004.415993] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3004.466127] device hsr_slave_0 entered promiscuous mode [ 3004.514950] device hsr_slave_1 entered promiscuous mode [ 3004.566600] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3004.573559] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3004.591111] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3004.633146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3004.641949] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3004.650692] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3004.659270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3004.667645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3004.682241] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3004.688696] 8021q: adding VLAN 0 to HW filter on device team0 [ 3004.698791] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3004.706239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3004.706791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3004.721772] bridge0: port 1(bridge_slave_0) entered blocking state [ 3004.728187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3004.736948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3004.752793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3004.760066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3004.769187] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3004.777132] bridge0: port 2(bridge_slave_1) entered blocking state [ 3004.783463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3004.793680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3004.801489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3004.820072] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3004.830657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3004.841263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3004.848793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3004.856968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3004.879756] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3004.887072] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3004.894996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3004.906190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3004.919949] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3004.926418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3004.945562] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3004.957098] 8021q: adding VLAN 0 to HW filter on device batadv0 22:56:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x20000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:55 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1cf}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:55 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) write(r0, &(0x7f0000000000)="5b4baf6112d3f08589f20c4808e792940a8f47cf6379c3594d59a8776cc0c870b2d15c80a1de8af5abeeb96913", 0x2d) 22:56:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x4c00}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3004.996025] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3005.007594] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3005.067329] usb usb9: usbfs: process 5321 (syz-executor4) did not claim interface 2 before use [ 3005.090580] usb usb9: usbfs: process 5321 (syz-executor4) did not claim interface 2 before use [ 3005.103888] kernel msg: ebtables bug: please report to author: bad policy 22:56:55 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3005.112629] usb usb9: usbfs: process 5326 (syz-executor5) did not claim interface 2 before use [ 3005.122035] usb usb9: usbfs: process 5330 (syz-executor3) did not claim interface 0 before use [ 3005.128189] kernel msg: ebtables bug: please report to author: bad policy [ 3005.145512] device bridge_slave_1 left promiscuous mode [ 3005.152576] usb usb9: usbfs: process 5335 (syz-executor5) did not claim interface 2 before use [ 3005.163045] bridge0: port 2(bridge_slave_1) entered disabled state 22:56:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x48000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:55 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0xa1, 0x2, 0x2, 0xd}) [ 3005.198053] usb usb9: usbfs: process 5342 (syz-executor3) did not claim interface 0 before use [ 3005.226116] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3005.276142] device bridge_slave_0 left promiscuous mode [ 3005.287022] bridge0: port 1(bridge_slave_0) entered disabled state [ 3005.295441] kernel msg: ebtables bug: please report to author: bad policy [ 3005.314080] usb usb9: usbfs: process 5353 (syz-executor5) did not claim interface 2 before use 22:56:55 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x3, 0x401, 0x3}) 22:56:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4c000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3005.329108] usb usb9: usbfs: process 5355 (syz-executor4) did not claim interface 2 before use [ 3005.339560] usb usb9: usbfs: process 5356 (syz-executor5) did not claim interface 2 before use [ 3005.457725] usb usb9: usbfs: process 5362 (syz-executor4) did not claim interface 2 before use [ 3005.478629] usb usb9: usbfs: process 5362 (syz-executor4) did not claim interface 2 before use 22:56:55 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) socket$inet6(0xa, 0x3, 0x8000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'nat\x00', 0x2, [{}, {}]}, 0x48) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3005.511423] usb usb9: usbfs: process 5364 (syz-executor5) did not claim interface 2 before use [ 3005.530589] usb usb9: usbfs: process 5366 (syz-executor5) did not claim interface 2 before use [ 3005.552960] device hsr_slave_1 left promiscuous mode [ 3005.603713] usb usb9: usbfs: process 5371 (syz-executor4) did not claim interface 2 before use [ 3005.628041] device hsr_slave_0 left promiscuous mode [ 3005.671651] team0 (unregistering): Port device team_slave_1 removed [ 3005.691422] team0 (unregistering): Port device team_slave_0 removed [ 3005.703364] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3005.730968] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3005.838222] bond0 (unregistering): Released all slaves 22:56:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x60000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:56 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) r1 = semget$private(0x0, 0x0, 0x180) semctl$GETZCNT(r1, 0x4, 0xf, &(0x7f0000000180)=""/162) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x80000001) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r2, &(0x7f0000000140)=0x4) r3 = getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000300)={{0x1, 0x5, 0x8001, 0xfffffffffffffffb, '\x00', 0x5}, 0x5, 0x400, 0x7fff, r3, 0x5, 0x6, 'syz1\x00', &(0x7f0000000240)=['bdevposix_acl_accessselinux,wlan1wlan0*keyringuser-\x00', '/dev/bus/usb/00#/00#\x00', 'vboxnet0@&]*}bdev&wlan0cpuseteth0@vboxnet0\x00', '\x00', '/dev/bus/usb/00#/00#\x00'], 0x8a, [], [0xffff, 0x5, 0x17d0, 0x9]}) [ 3005.965437] kernel msg: ebtables bug: please report to author: bad policy [ 3005.995775] usb usb9: usbfs: process 5378 (syz-executor4) did not claim interface 2 before use 22:56:56 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1d0}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x6000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3006.015511] usb usb9: usbfs: process 5380 (syz-executor5) did not claim interface 2 before use [ 3006.047680] usb usb9: usbfs: process 5378 (syz-executor4) did not claim interface 2 before use [ 3006.113909] usb usb9: usbfs: process 5392 (syz-executor5) did not claim interface 2 before use [ 3006.118105] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:56 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000140)={0x2000, &(0x7f0000000080), 0x4, r0, 0x5}) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000040)) 22:56:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3006.162105] usb usb9: usbfs: process 5395 (syz-executor3) did not claim interface 0 before use [ 3006.177591] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x68000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3006.253384] usb usb9: usbfs: process 5407 (syz-executor3) did not claim interface 0 before use [ 3006.273853] kernel msg: ebtables bug: please report to author: bad policy [ 3006.291081] usb usb9: usbfs: process 5406 (syz-executor4) did not claim interface 2 before use 22:56:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x6800}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:56 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1d1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3006.308620] kernel msg: ebtables bug: please report to author: bad policy 22:56:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3006.380621] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3006.408662] usb usb9: usbfs: process 5406 (syz-executor4) did not claim interface 2 before use [ 3006.446593] usb usb9: usbfs: process 5423 (syz-executor5) did not claim interface 2 before use [ 3006.503066] usb usb9: usbfs: process 5428 (syz-executor5) did not claim interface 2 before use 22:56:56 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) dup2(r0, r0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:56:56 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1d2}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3006.555030] usb usb9: usbfs: process 5430 (syz-executor3) did not claim interface 0 before use [ 3006.571037] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3006.594927] kernel msg: ebtables bug: please report to author: bad policy 22:56:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6c000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3006.631836] usb usb9: usbfs: process 5442 (syz-executor3) did not claim interface 0 before use [ 3006.708495] kernel msg: ebtables bug: please report to author: bad policy 22:56:56 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) fchdir(r0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:56:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x6c00}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3006.807016] usb usb9: usbfs: process 5453 (syz-executor5) did not claim interface 2 before use 22:56:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x74000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:57 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1d3}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3006.886991] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3006.905642] usb usb9: usbfs: process 5461 (syz-executor4) did not claim interface 2 before use 22:56:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3006.964826] usb usb9: usbfs: process 5469 (syz-executor4) did not claim interface 2 before use [ 3007.007772] kernel msg: ebtables bug: please report to author: bad policy [ 3007.022639] usb usb9: usbfs: process 5471 (syz-executor3) did not claim interface 0 before use 22:56:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3007.050323] kernel msg: ebtables bug: please report to author: bad policy [ 3007.065609] usb usb9: usbfs: process 5476 (syz-executor3) did not claim interface 0 before use 22:56:57 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x222000, 0x0) sendmsg$unix(r0, 0xfffffffffffffffd, 0x40090) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0x400) io_setup(0x0, &(0x7f0000000040)=0x0) io_cancel(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf, 0x4, r1, &(0x7f0000000200)="044e9b939fb6b2704177307e5cd8cb7bd5d6a1e542b1257dd7ab0ab275b516a4baa41078e225f7e7906a1f0a05d992e47274a90139d190f1bf827440d985b275f6bb56789516e3fc37ccc42862a7a8d1736de1b64f1ae1b9775e2369b06c40c60eae9e880c1afcb9529bedb49aaa6637ad9f0925a1664b983ec5aedafcd9ed73d4dc3534565889b4e201a5a2239a1fad276a8deeb25e7a01afafb7a7631abb", 0x9f, 0xedb, 0x0, 0x2, r1}, &(0x7f0000000300)) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000140)={0x26, "17343e4f005abefcc542f5cfd857aaf098b1f147825c08420d1d00ec6cf3cf0ddb3b4a99d5c57d956daf1e7bff2a48b828ee5d088e552f5ea6b5ba47837813ec49117266403559636449f58c134600bca91fe255d6c463c157306efd0d6d90c488295eeca7a2a42fdea84bd733538a16a08d9d960d5b0046644fde75afdf6e43"}) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:56:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x7400}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7a000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3007.155544] usb usb9: usbfs: process 5486 (syz-executor5) did not claim interface 2 before use [ 3007.264107] usb usb9: usbfs: process 5496 (syz-executor4) did not claim interface 2 before use 22:56:57 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1d4}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3007.310689] kernel msg: ebtables bug: please report to author: bad policy [ 3007.320917] usb usb9: usbfs: process 5495 (syz-executor3) did not claim interface 0 before use 22:56:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:57 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000140)={0x2, &(0x7f0000000080)=[{0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000280)={r1, 0x2, &(0x7f0000000180)=[0x1ff, 0x2], &(0x7f00000001c0)=[0x100, 0x80000001, 0x8, 0x7f, 0x4], 0x53, 0x6, 0x8, &(0x7f0000000200)=[0x8, 0x0, 0xae, 0x81, 0x9, 0xffff], &(0x7f0000000240)=[0x1000, 0x7fffffff, 0x7, 0xffffffff, 0x8, 0x9, 0x8, 0x6, 0x0]}) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000000)=0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000002c0)={0x0, 0x664800000000000}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000340)={r3, 0x8d01}, &(0x7f0000000380)=0x8) 22:56:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x7a00}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3007.371822] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3007.395105] usb usb9: usbfs: process 5509 (syz-executor5) did not claim interface 2 before use [ 3007.407662] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x100000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3007.537637] kernel msg: ebtables bug: please report to author: bad policy [ 3007.596681] kernel msg: ebtables bug: please report to author: bad policy [ 3007.610445] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:57 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1d5}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3007.645301] usb usb9: usbfs: process 5529 (syz-executor3) did not claim interface 0 before use [ 3007.664906] usb usb9: usbfs: process 5533 (syz-executor4) did not claim interface 2 before use [ 3007.677603] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3007.701973] kernel msg: ebtables bug: please report to author: bad policy 22:56:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x1000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3007.745168] usb usb9: usbfs: process 5539 (syz-executor3) did not claim interface 0 before use [ 3007.786157] usb usb9: usbfs: process 5544 (syz-executor4) did not claim interface 2 before use 22:56:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x200000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:58 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x0, 0x70, 0x2, 0x6, 0x2, 0xffffffffffff0001, 0x0, 0xcbe3, 0x8008, 0x4, 0x7, 0x9, 0x1, 0x10001, 0x1f, 0x7fffffff, 0x81, 0x7, 0x6527, 0xffff, 0x7, 0x100000000, 0x7fff, 0x6f5, 0x3, 0xffffffffdce3776f, 0xfffffffffffff085, 0x5, 0x9aaa, 0x0, 0x474b, 0x8, 0x9, 0x3, 0x4, 0x80, 0x0, 0x973, 0x0, 0x2, 0x2, @perf_config_ext={0x352, 0xd5}, 0x2000, 0x4, 0x1ff, 0x7, 0xcb98, 0x9, 0x20}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3) socket$inet6_sctp(0xa, 0x1, 0x84) [ 3007.890265] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3007.903924] usb usb9: usbfs: process 5558 (syz-executor3) did not claim interface 0 before use [ 3007.928049] kernel msg: ebtables bug: please report to author: bad policy 22:56:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3007.959351] usb usb9: usbfs: process 5569 (syz-executor3) did not claim interface 0 before use [ 3007.968886] kernel msg: ebtables bug: please report to author: bad policy 22:56:58 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1d6}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x300000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3008.078884] usb usb9: usbfs: process 5578 (syz-executor4) did not claim interface 2 before use 22:56:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x2000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3008.129598] usb usb9: usbfs: process 5578 (syz-executor4) did not claim interface 2 before use [ 3008.166465] kernel msg: ebtables bug: please report to author: bad policy 22:56:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:58 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x4, 0x1, 0x6, 0x2, 0x7fff}, 0xc) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x7fffffff, 0x54, 0x80000001, 0x6}]}, 0x10) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x4fe7, 0x7fff, 0x1ff, 0x46bfed50, 0x9}) [ 3008.274455] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3008.327696] usb usb9: usbfs: process 5601 (syz-executor5) did not claim interface 2 before use [ 3008.376896] kernel msg: ebtables bug: please report to author: bad policy [ 3008.387707] usb usb9: usbfs: process 5607 (syz-executor3) did not claim interface 0 before use 22:56:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x400000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:56:58 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1d7}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3008.436449] usb usb9: usbfs: process 5614 (syz-executor3) did not claim interface 0 before use [ 3008.463670] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x3000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3008.548996] usb usb9: usbfs: process 5613 (syz-executor4) did not claim interface 2 before use [ 3008.565291] usb usb9: usbfs: process 5624 (syz-executor5) did not claim interface 2 before use [ 3008.576699] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x500000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3008.598817] usb usb9: usbfs: process 5621 (syz-executor4) did not claim interface 2 before use [ 3008.626549] kernel msg: ebtables bug: please report to author: bad policy 22:56:58 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e23, 0xfff, @empty, 0x9}}, 0x660c, 0x6, 0x3, 0x3}, &(0x7f0000000080)=0x98) 22:56:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3008.733594] usb usb9: usbfs: process 5638 (syz-executor3) did not claim interface 0 before use [ 3008.788662] usb usb9: usbfs: process 5644 (syz-executor3) did not claim interface 0 before use 22:56:59 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1d8}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x4000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3008.845934] usb usb9: usbfs: process 5648 (syz-executor4) did not claim interface 2 before use [ 3008.889240] usb usb9: usbfs: process 5648 (syz-executor4) did not claim interface 2 before use [ 3008.906568] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3008.925807] kernel msg: ebtables bug: please report to author: bad policy 22:56:59 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) 22:56:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3009.022068] usb usb9: usbfs: process 5659 (syz-executor3) did not claim interface 0 before use [ 3009.061780] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3009.065360] usb usb9: usbfs: process 5667 (syz-executor3) did not claim interface 0 before use 22:56:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x5000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:56:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:56:59 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1d9}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:56:59 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x105000, 0x100) ioctl$TIOCSCTTY(r0, 0x540e, 0x8) [ 3009.318980] usb usb9: usbfs: process 5680 (syz-executor3) did not claim interface 0 before use [ 3009.374615] usb usb9: usbfs: process 5686 (syz-executor3) did not claim interface 0 before use [ 3009.385640] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:56:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x6000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3009.420215] usb usb9: usbfs: process 5689 (syz-executor4) did not claim interface 2 before use [ 3009.451508] usb usb9: usbfs: process 5689 (syz-executor4) did not claim interface 2 before use [ 3009.492890] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3009.548590] usb usb9: usbfs: process 5696 (syz-executor3) did not claim interface 0 before use [ 3009.566647] usb usb9: usbfs: process 5699 (syz-executor3) did not claim interface 0 before use 22:57:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x600000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:00 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1da}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x7000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:00 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001440)='/dev/dlm-control\x00', 0x800, 0x0) bind$can_raw(r0, &(0x7f0000001480), 0x10) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3010.330902] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3010.346611] usb usb9: usbfs: process 5713 (syz-executor4) did not claim interface 2 before use [ 3010.370026] usb usb9: usbfs: process 5710 (syz-executor3) did not claim interface 0 before use 22:57:00 executing program 4: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x101000) [ 3010.455588] usb usb9: usbfs: process 5721 (syz-executor3) did not claim interface 0 before use 22:57:00 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1db}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3010.496557] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:00 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$TIOCNXCL(r0, 0x540d) [ 3010.628071] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0xa000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3010.688610] usb usb9: usbfs: process 5742 (syz-executor4) did not claim interface 2 before use [ 3010.692723] IPVS: ftp: loaded support on port[0] = 21 [ 3010.738427] IPVS: ftp: loaded support on port[0] = 21 [ 3010.755954] usb usb9: usbfs: process 5742 (syz-executor4) did not claim interface 2 before use [ 3010.822987] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3010.855430] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3010.887772] usb usb9: usbfs: process 5749 (syz-executor3) did not claim interface 0 before use [ 3011.103030] chnl_net:caif_netlink_parms(): no params data found [ 3011.130775] chnl_net:caif_netlink_parms(): no params data found [ 3011.199340] bridge0: port 1(bridge_slave_0) entered blocking state [ 3011.206649] bridge0: port 1(bridge_slave_0) entered disabled state [ 3011.213685] device bridge_slave_0 entered promiscuous mode [ 3011.228904] bridge0: port 1(bridge_slave_0) entered blocking state [ 3011.236562] bridge0: port 1(bridge_slave_0) entered disabled state [ 3011.243981] device bridge_slave_0 entered promiscuous mode [ 3011.251653] bridge0: port 2(bridge_slave_1) entered blocking state [ 3011.258979] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.266868] device bridge_slave_1 entered promiscuous mode [ 3011.273115] bridge0: port 2(bridge_slave_1) entered blocking state [ 3011.279784] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.287383] device bridge_slave_1 entered promiscuous mode [ 3011.332728] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3011.342815] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3011.352262] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3011.364797] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3011.412025] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3011.420569] team0: Port device team_slave_0 added [ 3011.426326] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3011.433667] team0: Port device team_slave_0 added [ 3011.439658] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3011.448266] team0: Port device team_slave_1 added [ 3011.453649] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3011.460939] team0: Port device team_slave_1 added [ 3011.466462] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3011.485883] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3011.493232] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3011.501289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3011.576206] device hsr_slave_0 entered promiscuous mode [ 3011.614535] device hsr_slave_1 entered promiscuous mode [ 3011.671832] device bridge_slave_1 left promiscuous mode [ 3011.678081] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.725432] device bridge_slave_0 left promiscuous mode [ 3011.730979] bridge0: port 1(bridge_slave_0) entered disabled state [ 3011.770084] device bridge_slave_1 left promiscuous mode [ 3011.775715] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.845124] device bridge_slave_0 left promiscuous mode [ 3011.850625] bridge0: port 1(bridge_slave_0) entered disabled state [ 3012.053398] device hsr_slave_1 left promiscuous mode [ 3012.120233] device hsr_slave_0 left promiscuous mode [ 3012.189112] team0 (unregistering): Port device team_slave_1 removed [ 3012.203782] team0 (unregistering): Port device team_slave_0 removed [ 3012.217266] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3012.281363] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3012.362908] bond0 (unregistering): Released all slaves [ 3012.517793] device hsr_slave_1 left promiscuous mode [ 3012.560521] device hsr_slave_0 left promiscuous mode [ 3012.600532] team0 (unregistering): Port device team_slave_1 removed [ 3012.612024] team0 (unregistering): Port device team_slave_0 removed [ 3012.628180] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3012.708521] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3012.790024] bond0 (unregistering): Released all slaves [ 3012.897290] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3012.957582] device hsr_slave_0 entered promiscuous mode [ 3012.994502] device hsr_slave_1 entered promiscuous mode [ 3013.053303] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3013.060600] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3013.068181] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3013.088950] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3013.102775] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3013.179240] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3013.194508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3013.203260] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3013.219752] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3013.228734] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3013.237259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3013.247382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3013.256021] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3013.262381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3013.270210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3013.279160] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3013.285399] 8021q: adding VLAN 0 to HW filter on device team0 [ 3013.294363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3013.303971] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3013.310772] 8021q: adding VLAN 0 to HW filter on device team0 [ 3013.317377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3013.326246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3013.333804] bridge0: port 1(bridge_slave_0) entered blocking state [ 3013.340246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3013.349243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3013.357360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3013.367972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3013.376579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3013.384360] bridge0: port 2(bridge_slave_1) entered blocking state [ 3013.390707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3013.400778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3013.409460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3013.475270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3013.483276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3013.491235] bridge0: port 1(bridge_slave_0) entered blocking state [ 3013.497603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3013.504911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3013.512786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3013.523031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3013.534743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3013.596228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3013.604596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3013.612775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3013.620806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3013.628787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3013.636941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3013.644632] bridge0: port 2(bridge_slave_1) entered blocking state [ 3013.651024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3013.658327] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3013.668579] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3013.677655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3013.688693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3013.696957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3013.704877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3013.716075] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3013.727885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3013.735409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3013.743236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3013.751658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3013.762039] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3013.777058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3013.786769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3013.797406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3013.811571] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3013.818056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3013.831021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3013.839157] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3013.857017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3013.877704] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3013.890694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3013.898789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3013.913558] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3013.927196] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3013.946116] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3013.954054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3013.967768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3013.982454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3013.993273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3014.005749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3014.019356] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3014.026294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3014.073114] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3014.095433] kernel msg: ebtables bug: please report to author: bad policy [ 3014.115211] 8021q: adding VLAN 0 to HW filter on device batadv0 22:57:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x700000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:04 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1dc}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:04 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000000)) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x20000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3014.176855] usb usb9: usbfs: process 5772 (syz-executor5) did not claim interface 2 before use [ 3014.252684] usb usb9: usbfs: process 5781 (syz-executor4) did not claim interface 2 before use [ 3014.268935] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3014.289080] usb usb9: usbfs: process 5785 (syz-executor4) did not claim interface 2 before use 22:57:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3014.303897] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3014.325716] kernel msg: ebtables bug: please report to author: bad policy [ 3014.332862] usb usb9: usbfs: process 5787 (syz-executor3) did not claim interface 0 before use [ 3014.346002] kernel msg: ebtables bug: please report to author: bad policy 22:57:04 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x300, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000040)={&(0x7f0000ffe000/0x2000)=nil, 0x81, 0x3, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x6}) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x400, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3014.398613] usb usb9: usbfs: process 5797 (syz-executor3) did not claim interface 0 before use [ 3014.472632] usb usb9: usbfs: process 5808 (syz-executor5) did not claim interface 2 before use [ 3014.497938] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3014.517702] kernel msg: ebtables bug: please report to author: bad policy 22:57:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x3f000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:04 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1dd}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0xa00000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3014.578114] kernel msg: ebtables bug: please report to author: bad policy 22:57:04 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000080)={0x0, 0x9, 0x10000, &(0x7f0000000040)=0x40}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa1, 0x2}) fstatfs(r0, &(0x7f0000000100)=""/81) [ 3014.717617] usb usb9: usbfs: process 5825 (syz-executor3) did not claim interface 0 before use [ 3014.748187] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x48000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3014.764696] usb usb9: usbfs: process 5829 (syz-executor5) did not claim interface 2 before use [ 3014.795976] usb usb9: usbfs: process 5832 (syz-executor4) did not claim interface 2 before use 22:57:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3014.819052] kernel msg: ebtables bug: please report to author: bad policy [ 3014.827099] usb usb9: usbfs: process 5845 (syz-executor4) did not claim interface 2 before use [ 3014.882188] usb usb9: usbfs: process 5846 (syz-executor5) did not claim interface 2 before use [ 3014.915298] usb usb9: usbfs: process 5850 (syz-executor3) did not claim interface 0 before use 22:57:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x4c000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x2000000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3014.939589] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3014.956134] usb usb9: usbfs: process 5858 (syz-executor3) did not claim interface 0 before use 22:57:05 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1de}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:05 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x9c96, 0x0) fsetxattr(r0, &(0x7f00000001c0)=@known='user.syz\x00', &(0x7f0000000200)='+@em1eth0(\x00', 0xb, 0x3) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0xffffffffffffffff}) [ 3015.036150] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3015.068259] kernel msg: ebtables bug: please report to author: bad policy 22:57:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4800000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3015.103883] usb usb9: usbfs: process 5872 (syz-executor5) did not claim interface 2 before use [ 3015.125174] kernel msg: ebtables bug: please report to author: bad policy [ 3015.201843] usb usb9: usbfs: process 5880 (syz-executor4) did not claim interface 2 before use 22:57:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3015.242572] usb usb9: usbfs: process 5883 (syz-executor3) did not claim interface 0 before use [ 3015.270569] usb usb9: usbfs: process 5885 (syz-executor4) did not claim interface 2 before use 22:57:05 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1df}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3015.303695] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3015.327847] usb usb9: usbfs: process 5887 (syz-executor3) did not claim interface 0 before use 22:57:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x60000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:05 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000140)) getsockname$ax25(r0, &(0x7f00000001c0)={{0x3, @netrom}, [@netrom, @remote, @bcast, @rose, @bcast, @netrom, @rose, @rose]}, &(0x7f0000000240)=0x48) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3015.405800] usb usb9: usbfs: process 5894 (syz-executor5) did not claim interface 2 before use 22:57:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x4c00000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3015.462143] kernel msg: ebtables bug: please report to author: bad policy [ 3015.498503] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3015.524737] kernel msg: ebtables bug: please report to author: bad policy 22:57:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3015.580703] usb usb9: usbfs: process 5912 (syz-executor4) did not claim interface 2 before use [ 3015.590249] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:05 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000140)={"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"}) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3015.668453] usb usb9: usbfs: process 5919 (syz-executor3) did not claim interface 0 before use 22:57:05 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1e0}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3015.755728] usb usb9: usbfs: process 5928 (syz-executor5) did not claim interface 2 before use 22:57:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x68000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3015.800347] usb usb9: usbfs: process 5925 (syz-executor3) did not claim interface 0 before use [ 3015.815087] kernel msg: ebtables bug: please report to author: bad policy [ 3015.835942] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3015.860941] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6000000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:06 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x40000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3015.905839] kernel msg: ebtables bug: please report to author: bad policy 22:57:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x6c000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3016.043626] usb usb9: usbfs: process 5956 (syz-executor3) did not claim interface 0 before use [ 3016.056675] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3016.081409] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:06 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1e1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3016.100690] usb usb9: usbfs: process 5959 (syz-executor4) did not claim interface 2 before use [ 3016.110238] kernel msg: ebtables bug: please report to author: bad policy [ 3016.134490] usb usb9: usbfs: process 5958 (syz-executor5) did not claim interface 2 before use 22:57:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3016.158536] kernel msg: ebtables bug: please report to author: bad policy [ 3016.185052] usb usb9: usbfs: process 5970 (syz-executor5) did not claim interface 2 before use 22:57:06 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3016.257705] usb usb9: usbfs: process 5977 (syz-executor3) did not claim interface 0 before use 22:57:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6800000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x74000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3016.307074] usb usb9: usbfs: process 5985 (syz-executor3) did not claim interface 0 before use [ 3016.322961] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3016.384336] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:06 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1e2}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3016.439052] kernel msg: ebtables bug: please report to author: bad policy [ 3016.461498] kernel msg: ebtables bug: please report to author: bad policy [ 3016.474361] usb usb9: usbfs: process 6003 (syz-executor4) did not claim interface 2 before use 22:57:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x6c00000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3016.498685] usb usb9: usbfs: process 6005 (syz-executor5) did not claim interface 2 before use [ 3016.536359] usb usb9: usbfs: process 6007 (syz-executor3) did not claim interface 0 before use 22:57:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x7a000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3016.675828] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3016.714333] usb usb9: usbfs: process 6019 (syz-executor5) did not claim interface 2 before use 22:57:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3016.734000] usb usb9: usbfs: process 6028 (syz-executor5) did not claim interface 2 before use [ 3016.756690] kernel msg: ebtables bug: please report to author: bad policy 22:57:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3016.778270] kernel msg: ebtables bug: please report to author: bad policy [ 3016.780078] usb usb9: usbfs: process 6027 (syz-executor3) did not claim interface 0 before use 22:57:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7400000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:07 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1e3}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3016.865581] usb usb9: usbfs: process 6037 (syz-executor3) did not claim interface 0 before use [ 3016.921560] kernel msg: ebtables bug: please report to author: bad policy [ 3016.981418] kernel msg: ebtables bug: please report to author: bad policy [ 3017.012691] usb usb9: usbfs: process 6050 (syz-executor5) did not claim interface 2 before use [ 3017.031564] usb usb9: usbfs: process 6052 (syz-executor5) did not claim interface 2 before use [ 3017.267489] usb usb9: usbfs: process 6059 (syz-executor4) did not claim interface 2 before use 22:57:07 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0xa1, 0x2, 0x0, 0x3}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000000c0)={0x6, &(0x7f0000000140)="8f526375015983508581d1b341a880e1e116cb07c248ab5e29377649bf3110142bb62a9bc700b5ec2cc2e9bf5585ee60c444adb0e60476090dc0110a23b1766030f876409c3cf390fc3c762d72bd3382485418a425b037151b46754f961d1b54ab89d80ac0004f3f9e61773238817bb85b89c6e45d8f"}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) 22:57:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x100000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0, 0x7a00000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:07 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1e4}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3017.756094] usb usb9: usbfs: process 6070 (syz-executor3) did not claim interface 0 before use [ 3017.766149] kernel msg: ebtables bug: please report to author: bad policy [ 3017.782327] kernel msg: ebtables bug: please report to author: bad policy 22:57:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x200000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3017.800272] usb usb9: usbfs: process 6066 (syz-executor5) did not claim interface 2 before use 22:57:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3017.854505] usb usb9: usbfs: process 6079 (syz-executor4) did not claim interface 2 before use [ 3017.885906] usb usb9: usbfs: process 6081 (syz-executor5) did not claim interface 2 before use 22:57:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r2 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x8, 0x103880) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000140)=0x5) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0xfffffffffffffffb, 0x0, 0x800000000, 0x800}) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') recvmmsg(r2, &(0x7f0000000740)=[{{&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000240)=""/7, 0x7}, 0x40}, {{&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/147, 0x93}], 0x1, &(0x7f0000000400)=""/245, 0xf5}, 0x5dc}, {{&(0x7f0000000500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000580)=""/56, 0x38}, {&(0x7f00000005c0)=""/120, 0x78}, {&(0x7f0000000640)=""/96, 0x60}], 0x3, &(0x7f0000000700)=""/52, 0x34}}], 0x3, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000900)=0xe8) getpeername$packet(r2, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@ipv4={[], [], @remote}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000004200)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004240)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000004340)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000004400)={0x0, @local, @empty}, &(0x7f0000004440)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000004480)={{{@in6=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000004580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000004680)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000046c0)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000047c0)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000048c0)={0x0, @remote, @multicast1}, &(0x7f0000004900)=0xc) accept$packet(r2, &(0x7f0000004940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004980)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000049c0)={0x0, @initdev, @initdev}, &(0x7f0000004a00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000004a40)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000004b40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f00000050c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x886}, 0xc, &(0x7f0000005080)={&(0x7f0000004b80)={0x4cc, r3, 0x401, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r4}, {0x138, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r9}, {0x18c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r10}, {0x170, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfab}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xf66}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x58, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x5, 0x10001}, {0x5, 0x0, 0x80, 0xfffffffffffffff7}, {0x8, 0x1000, 0x10000, 0x8001}, {0xc5, 0x4, 0x7, 0x80000000}]}}}]}}, {{0x8, 0x1, r16}, {0x4}}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x10}, 0x4040800) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3017.932377] usb usb9: usbfs: process 6079 (syz-executor4) did not claim interface 2 before use [ 3017.945099] kernel msg: ebtables bug: please report to author: bad policy 22:57:08 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1e5}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:08 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) getrlimit(0x5, &(0x7f0000000000)) [ 3017.974392] kernel msg: ebtables bug: please report to author: bad policy [ 3017.990989] usb usb9: usbfs: process 6091 (syz-executor3) did not claim interface 0 before use [ 3018.052871] IPVS: ftp: loaded support on port[0] = 21 22:57:08 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) accept$alg(r1, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3018.122633] usb usb9: usbfs: process 6109 (syz-executor4) did not claim interface 2 before use 22:57:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x300000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3018.172857] usb usb9: usbfs: process 6109 (syz-executor4) did not claim interface 2 before use 22:57:08 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1e6}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:08 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) write$binfmt_misc(r0, &(0x7f0000000140)={'syz1', "11f0937e18859c37cb67f7e1313a887beb33b104d05d7c07df21863b72f7787a7578e491eb6ad0f6c429ca756361a67f7df2e011e1b5c848942262e0f944c5f7f50d51e7246bb8c90d7b2a5c3e2ffd33a5981dbaa1bd52e540b8d0bca4e59c78a3ddbfe29cb0add53ed5a1d41f129ead74a453f531b6c544a51f6af9b2cba4e3040b131e281325cdc0c76ed3cfb22ea650d5361db2e56fbded695ccf2630f2aa4ac056dc7cef09199b713db0c6e1f42c9560f5a883c506a8f7f7bff7920875eb4663f9681b7d5f5ff44d3f50ffb3eef432b79a6e3777891ac4e6cd6bedf658280d44feffb1c5d4b1c09f83362563408699289ef932d371db509459109cfbb597cda83d6cb75ac50c0d8290f91a78f10ce4a8c15344816dd62cc24a67ffbe1a695e142aec5b2dd442a05dc61df76e571a65da18dc96548eddf3a383718d2f4efa0a80ea07e4486b794b5f5be59ff0a9f235081dee6ce5891af674562083ac85ab9f131dd697aca02a4ef9563fc19da928d75a37597d59a417fa352f2b1ec8b7a291e330224c9223f65f1b8328724a6dbad17b34481f6a8c42fe8d55f46e25ceb7759e9ddf1bbdb3c9ca9921e1371ff9d4001e1752a65cc0109458dee4c53c1120991371c41f1318691df85142471889469f870b7949fd932a66b796eaaf29eb653df1e9aa83622eb4b58ce6835819b841e863caed5f760a8161a7a3fa3f32235191bdd9155a62cce71bedd04da098382cc5406670ef00aedeb03232c80e36be665c7ac5dca7f00a45e1edc299a79e1f919b9795a6a5b7b69a26feede21076da3232de7a04e7b219a62a1ec2eacb08834dbb407bd035429abe7ba8576d9d39b7bae2c9873574081d5582ee56875b0c2770de5017ed3414b37f4bd434c83639171fa0bcec22c34d4f6941c4ab928cc447359472f411d814dab819c1fc7c6d374262c8226359b3d7339abd29e994236b59734f92593f9c6da2f4819a56c6c6d3989db1bf01b3035432fee6362dfdf663ea86c5ec08a37be458be8988f2030eecfb8d51b3a6338d6fcb54f1d58a659ddecf3c3a740f9c90f3201c1e125b0db34ac402023e3f46dc698fa5f29f576adc335fb9b286665ddb600ac3dfdbe4635515847e8fbea982ee4e60a32bef83317cfd2af11ef7e9fd54310acf2baf58af9000c72cd69a96476b7968773aaa34134650fd735ad1d7add7598e6a3b842e5fe581a050f6f9ad332bfb4fa7400ba272e58f469b63a31cccb6e1de4a17cc56564575758685093d731b085654dd12f22c378e547df9b9988277512b430cc43638c2dbbf52b57e79d959438d251874a69c6c162a786be511cf3e3df12a0e144a6d41a816f9866d69f0eb3d98f0edd8da176470fc6ff7e9197e0da86b2c3415614bc5ae057b69f50f54369fdbb7da0cb0644e7ba7cc0985fbc59d1ab1c9e147caf88a6c9545dbd7542a5944bdeab53ff3932dac1fc4211a91e6a29d7a24fed1831ca7ed54f8cc234b8570f3ca28bc301e2c7bdf5c24069a38f27f8278c75ac1da335b686267e308a26d6083e5bf5b1232b0c94842af8fa087f6bd76fbca1edea5744569a28e3134e6320fa440aa570bd1cff71dad65915c699c33d9d9ffda73d3b1a8a4f6a3162980c4bcc027c037da66fdf46407101d1aafe22ad2a37d52cbf403a211c0875b74be803591f85561cfae014145287a92314faf1bf40108ce6fe144d524d10c41f31a85d75c927318649ba5796819f44a9e5b9d049ebde4c522a010517b8f9c2be30cdccc5d11acf1dfa7ed0f0de499ee5e06e7681157f478d6881e9c91dd6fef6ddfaf9dd1b46ff3cbdced63e4e0e5d83517f198fc383e850b06ba66c549d18323ce943ad59b605a2bce7a7f917319e5d4c7c66ac8b153b0af342c19776dadd7accec6614ad66a9ce42678112ba49ddbf2a43260809f03d1b720e5fb8d4b44edcfe663604d1ced69754981a7a52254159792c1921a6720853c6f26e47c9c3d233adf58eb947c05ef5ea54faed295149a0026d5f6c68f536f908af6fdbb91ddabb4621b5b9349dd2887de3b54a0851b58332196d9c3fb34d98f2e9483e1961f743f647aaa6a9c421471e1c6d31cc035b05dbfd067b6a7aa406fbae11befee9ffe871276a65bf29af6b84ed79ea5f98856c465842ef8a11d71271869c9ce5f9a186737602af63770691f72f534c7094954003c1eed8efbc3833d381d967add67524226022e30ed26165f226a2a623541ba9ca2dc3ca601d075bb769429850ddd0ff428fd6645808c5f611383a7c0447733d2726be01314b8b267ddb1e4a67080752f1cfe771d6b5443c54a4d921b516d5f7eb68900db711abeec92f06ffc9dee78611c03b55c422451a369ea0640a0a2d75c2d5eda645bd6c6c99100b8113a781d3c6d8658dc86eb66a141543f3f6a217e32ab2091575d68bccdfb24a4f62fb6503f65313a1a6e5340ab5e25b13046277bdddc9753846a76b6e8228a6bc9bfd75e31227b918f76de85a66caf4622000cbaad693c4949d84566ebbbf1e95f2d55fd14459a15274e02ed1f2959aff249f1cb671753542cff05e04a64481a06d34a3c6f85137a800214271ee3b286b06f2705ade02ba0eb15b348b77073e6b9ff6124c7796e3a4e53f3b01da986a10d1ffb3c15db910ebe3af862e87fb014853033e412820f3c958207838f544195c48c49b58c20b5fbb05cf1604a7fb113dcecd4902e13f15f9c3ccb458d661182e31583c33f2886cc67b0f3d385d0826273ee774ea5238fa9b0cef8bbed42a22b5cae166ac26fce07f8e058a287873ce18b8458f065960b6dad44c7de054fa2c9c74a454ee200f84ba23af390afd143a14e6d6a625b35c72cd08a59d55b38d05c00de5ad88507184221e3e56f109c6a6ad700abc01cc8c5d0932701cc44260f916e7b86881eaa1f5e115b27921bb3ac3a4511bd312fe1c1bef06f1376c1113765da3b84a8fb40edca212b4383e200fea1754f6daf1724868693860c6b968f0f19df4256258a4ba867db6cc41ac887735500a7376373760688452ea318d5ddb4771ece853320306f9e38580545bcacebbb732cde8bdb8e4fe6e8d6735082b4a913481da771320a5097606db287bc218f978fc02477ec3d8ecc4cf30f55e7097843a6ea2249c01103a2bd68815f989f27499cdc234687c1e6ec724d231decd51a5732f8e4d7a6ef97e7dfc803b370f6be9e67b6c2a66ae5b6548ec68c97f999d78441f045c78fb90f2b87a75123665cf0e29778fc96460c60f4c80d4987b064dcaad5f87fdd6b3c5a1c2efbe3cec769cb06c125cbc5ee4fe539cc649bd3f14165dd816c8d9b0dc73546296725fb994c7c0125b29ab6ca77d17c4000b1e9f0914621a181091b19546dcf5fd8ecf82787786f46343f6a6b2560cfb5de59e4432136659ff2739f7ac7cb32874b0eee7c1ef7bb4b690bf4b834abf0a14d7f24296f329c2b9b318c6b062f3bfb9b1e2bc1f69b6213a9426eeba1459eea541dcf3142c29db68bfc3a527e4b4c074556f7d5981efd73d9ce35ccd04e9924c5ec10b4d935ebd5e592af673cbc964963ad6d9c9de8f643078912ea974e3423ab0d901a8278a1b4ea7902cef1b11d04819a12677cfc4b73b93febea1e63c0fa80623e6509874c90ade3be05141358d420afd00fec46672f2de9e47477aa0861f5dae91d693293510673adc6e69b8774c0f44aa435e3b34aebcfe8d1d4f305d0823d81346aa97de07f8a20bde2b9f35f266fc1865bfc1d224d4225e3de2501f660a4311e3719e7eacdbd5e158a84712bdd707497ef5c7b765c23a2813c86bca29bc2d000b483d2f7d0110634a5fecd1be4d062242711a8eb984a49b1f18dc3c10807b5bad00f7aa469cfcdb99308200aaf6ee557a497c345eeee70b15906917aaa5d2bd5890f3cccf80cef663c6e87f12a0ba9bca095a918b4706e3eb623a56dbdb4302246b13114eb79bc1d3b2fafa1d532c9b2aa190862d961653f5dbefd1114d6811bdfbfa2359602fffdeec121297bdffade8c532329b4f46b7fec0186a5f73d9ba62944785f130490d30b5f89d065a94ae0dc089a4914acde937c3b294e0058ede47cb925a490b25ea2e1007bac21a5a4dd244c40f6dc15d12c1dd68100a9ae1f266205d116a12bae623efb53fcda2f6b9aea3dda0cb592abaefac450d6c7b061b5fdccdde804f8316ab683af23c7975b1c7db6a8859186dc7d06223fcdcccec1f46a49b229f5b3639e1fc1ec9bad002e3c323f56afe4d43af31a63befe6493b2078d0936b5b88d68377c8c8ddd8999da4acd445ba6d8edc524122c0fd4714e3418ef3cc0444941dc746df21e418be87626bda9c5db5759645d62da1a03bea5640c7548cf935e14b4e38ba9c543670cab193add337b04cbcfd04c87e6e7158b94d414782909bc635ba83c824be95265da398e1f8880e826ef28213f8234def6c4cd587ebd84c3167bd0449a40aae813c06ae0c72ddee37c9d7d05a1fafb0f600aad6471dceeda9b1be63f75aaa2b07abd0c6cc935fe00869f260c465d48d7c34dd5cd7e8ee08063589249813811ca12559798b117c8b7ecc9065dbc54316148cbc5c5fa962710b244be37f981663d8e541cf0886b006c1b9742c320b84d40df1f6555192a236c42e9c4778c8e9b6fd82ba163098093d95b0ea5bd382e299f59998fce9f3c2bb7de216b23df47f4a5d3725c299727598e93f3ce0230b3264841a34736384e2eaa2513f86683e5c971a4fc08a3388dbd81cfc50dea1c246fa093e2352977aa2c88f4320b3ed37810f2be483469bd90de792aa212cbe2ef089e838820eac03473f9a4442a57d0e15767a8a86ee661e097e62955d88e42ab5581692ea02a83fdc3e0e3798b3f27ca75db093f9701889b90e2451a07e7c51ba2e04b20e650e52948039059ab859616c2f221a329de67c8a38d5ff6d5cd72cf3969b8f6d150bd55a87b168eab06d86975d70525ef1106f0733de1de6195b8fa2b145db4b722c19f0d2b1a7dd53e161d927cac7909a23026dfb618f1e388c863554bd18e296e41f2848c0bc5c5286d5cf6c0fa7616457624ceb2945c278d62ad13c266c7dda6dcc11d0df131128fefcc6127767dd6878de73203e4182e5b2482495d23ab8912daee464bea07429978faad087bddaf7a851d82194d1844374ea8e95f27d638702901da1f569f1004ea237bf115a946c9b09b8bcc5e02a60472d39ffccbb41db7b6f43fab9b0de181538512612d83697d5dfe028fb0b3c613250ee0016fdd530f2a9157f43ded578a33af6e08ba85af06d865126ff2b87beb07cbf5b8b6eefca79bec8bb9092f3b6f0e1db84c2923d7997e9b38241893944c01d478d6e2b38a60eef4ca0e58c71dd7405baaa5d269218157c09f93ca408a1c9b5ff456c98247883111a7430fab3a65c1d92e67a06827da8609a971561123817c9ebd3f8bbf3c10dc9e3480f75293210ec9eaa21683b76611dc2d38a533f433483c0d4046dcd3efb1b15475eca98fbae9bff12189c50f93936ec8a1598fc57ac8a19907a20aab4eb6b0d5613bb83b237f424dbdd28400d098828f6d1324a141b7116cbd955ce07e17df45b0e056692ae93c4544f8d458564474760e71a9f7fea6c326a54363ade0288a86f6c1bbf1998b36019f49a346109f090b819750b93a793c4ef190db706f3a4c5eb7b31c104ccc5f329d6125d55d8833d3b50fe1be7d1a639f227bc94d5b96417c1b9ea4d3bc1776af821679b413fb7fd6102960afe3f3e23bf6c5b8ba06aaa0c330ed75c620335e5216faf360ae50d49f0739"}, 0x1004) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3018.266644] kernel msg: ebtables bug: please report to author: bad policy [ 3018.322211] kernel msg: ebtables bug: please report to author: bad policy [ 3018.336500] usb usb9: usbfs: process 6125 (syz-executor5) did not claim interface 2 before use 22:57:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0x3ff, 0x3a]) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000000)={0xffffffffffffff7f, 0x9, 0x3, 0x20, 0x5, 0xc6e}) ioctl$BLKRAGET(r2, 0x1263, 0x0) [ 3018.369432] usb usb9: usbfs: process 6126 (syz-executor3) did not claim interface 0 before use [ 3018.400912] usb usb9: usbfs: process 6130 (syz-executor5) did not claim interface 2 before use [ 3018.434828] usb usb9: usbfs: process 6138 (syz-executor4) did not claim interface 2 before use [ 3018.543359] usb usb9: usbfs: process 6145 (syz-executor5) did not claim interface 2 before use [ 3018.560112] usb usb9: usbfs: process 6148 (syz-executor5) did not claim interface 2 before use [ 3018.639171] device bridge_slave_1 left promiscuous mode [ 3018.655625] bridge0: port 2(bridge_slave_1) entered disabled state [ 3018.687678] device bridge_slave_0 left promiscuous mode [ 3018.693134] bridge0: port 1(bridge_slave_0) entered disabled state [ 3018.829248] device hsr_slave_1 left promiscuous mode [ 3018.890568] device hsr_slave_0 left promiscuous mode [ 3018.950292] team0 (unregistering): Port device team_slave_1 removed [ 3018.961710] team0 (unregistering): Port device team_slave_0 removed [ 3018.973645] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3019.011607] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3019.116145] bond0 (unregistering): Released all slaves [ 3019.200913] chnl_net:caif_netlink_parms(): no params data found [ 3019.237102] bridge0: port 1(bridge_slave_0) entered blocking state [ 3019.243533] bridge0: port 1(bridge_slave_0) entered disabled state [ 3019.250832] device bridge_slave_0 entered promiscuous mode [ 3019.258031] bridge0: port 2(bridge_slave_1) entered blocking state [ 3019.264532] bridge0: port 2(bridge_slave_1) entered disabled state [ 3019.271494] device bridge_slave_1 entered promiscuous mode [ 3019.297174] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3019.307693] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3019.329863] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3019.337402] team0: Port device team_slave_0 added [ 3019.343127] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3019.350816] team0: Port device team_slave_1 added [ 3019.356422] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3019.363977] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3019.428668] device hsr_slave_0 entered promiscuous mode [ 3019.484685] device hsr_slave_1 entered promiscuous mode [ 3019.524962] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3019.532039] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3019.551439] bridge0: port 2(bridge_slave_1) entered blocking state [ 3019.557892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3019.564616] bridge0: port 1(bridge_slave_0) entered blocking state [ 3019.570983] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3019.608325] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 3019.615368] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3019.646388] bridge0: port 1(bridge_slave_0) entered disabled state [ 3019.654118] bridge0: port 2(bridge_slave_1) entered disabled state [ 3019.670175] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3019.684889] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3019.693973] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3019.708393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3019.719731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3019.730171] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3019.737104] 8021q: adding VLAN 0 to HW filter on device team0 [ 3019.747209] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3019.754411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3019.762541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3019.771954] bridge0: port 1(bridge_slave_0) entered blocking state [ 3019.778393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3019.796058] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3019.813091] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3019.822601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3019.837959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3019.850064] bridge0: port 2(bridge_slave_1) entered blocking state [ 3019.856509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3019.871459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3019.882755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3019.897951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3019.913767] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3019.923742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3019.939572] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3019.958797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3019.970105] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3019.982657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3019.993913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3020.012097] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3020.022149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3020.037259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3020.053189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3020.064073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3020.078860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3020.092020] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3020.103399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3020.131468] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3020.153792] 8021q: adding VLAN 0 to HW filter on device batadv0 22:57:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:10 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x5, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0x4, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{}]}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x400000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x735) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:10 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1e7}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3020.210796] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3020.225414] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:10 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$RTC_WIE_OFF(r0, 0x7010) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="19f0db2e0b11915b6dac2f4194e3d20c", 0x10) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0xa1, 0x800000000000000}) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f00000001c0)='\x83\xf2\xdd2\xfd\xaa\xa4\xd4\x0e\x05\xf3@Bu\x96(u\x82\x14p\x11y)b!\xa7T\xa3]\xf5-c\x9a\xd7\xa5 \n\xc6\x19\xbc\xb9Y!\x83 l\\\xfeQ\x7f\xdc\x8bR\xc7\xden\xc2\xf0\xc9,\xc1\xa7c\x11\x03-\xc4\xcd\xa5\xe4G\xaaY\x99\xd0-\xcfe\xb7\xf8\xca\xf8w\x1f`i\x89\xdf\xa5St\x14\xfe\x80\xea\xe2\x92a\xeb\xf6{u\xbe\x93k\xbc\x0f\xb5\xe9h`\xcd\xeb(\x17\b\x05\xf7\x9b\xfc\x9b\xdc\x8e\xa86tS\x86\xcb\xedHm\t6\v7\x80iS\x9dS\x95N\x19\xd0d\xff\xff\xff\xff\xdc\xbfO\xfc9\xa5\xb2\xd2\x89@\x97\rkE1\x83<\x01\xd8\xb1\x15\xa6\xac+\xd7\x8d\xbbZ.\x89P\xe5\x8a') 22:57:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3020.294613] kernel msg: ebtables bug: please report to author: bad policy [ 3020.295792] usb usb9: usbfs: process 6162 (syz-executor3) did not claim interface 0 before use [ 3020.313738] kernel msg: ebtables bug: please report to author: bad policy [ 3020.355562] usb usb9: usbfs: process 6175 (syz-executor5) did not claim interface 2 before use 22:57:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x500000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3020.400108] usb usb9: usbfs: process 6178 (syz-executor3) did not claim interface 0 before use [ 3020.438365] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = accept(r0, &(0x7f0000000580)=@rc, &(0x7f00000004c0)=0xfffffeff) accept$unix(r1, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) 22:57:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3020.468707] kernel msg: ebtables bug: please report to author: bad policy [ 3020.476429] usb usb9: usbfs: process 6188 (syz-executor4) did not claim interface 0 before use 22:57:10 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1e8}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3020.559160] usb usb9: usbfs: process 6196 (syz-executor4) did not claim interface 0 before use [ 3020.568262] kernel msg: ebtables bug: please report to author: bad policy 22:57:10 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}}, 0x9, 0x7ff}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000003c0)={r1, 0x7fffffff, 0x8001, 0x2, 0x8, 0x4cd}, &(0x7f0000000400)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @initdev, @dev}, &(0x7f0000000200)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000240)={r2, 0x1, 0x6, @random="21f23df42f55"}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000600)={0x0, 0xf95b, 0x6, &(0x7f00000005c0)}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000140), &(0x7f0000000180)=0x4) sendmsg$TIPC_NL_SOCK_GET(r4, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000008}, 0xc, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="010000800000000064dfaf7daf33f932ba1ddb404b38f3c5a0b2e987f4974f2400000000000000000000000000", @ANYRES16=r5, @ANYBLOB="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"], 0x120}, 0x1, 0x0, 0x0, 0x8001}, 0x4000) ioctl$BLKRAGET(r4, 0x1263, 0x0) [ 3020.631531] usb usb9: usbfs: process 6204 (syz-executor3) did not claim interface 0 before use 22:57:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3020.672206] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:10 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000140)=0x0) quotactl(0x8, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000180)="c07a55bdff4f77f91223840bbf65b055d2a9d62100c8d64f17baee09d429d2083052c47035e08f92e8c1ff432fcb97c1c2a77a29e8b1d50b65b7ba641ee0527cd2ece4f9dfc974c2d2fab52d2d1ec6782eda54232f6e919d8af5f26eea6b0fc3375791a278fd84f242275165907fe6dfd22b03d83e0ddc87958c5f230be3bda5686b7df99cfcd59f474f61ca6bbd5c2b769daf2885b4c50d5b914f6aef7632051ee4bbbdeadfee8952fe868b274758626924fdca7b9dbd63b3a49ea18e45038ce9dcb5") ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0], 0x2}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x600000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3020.784007] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3020.860814] kernel msg: ebtables bug: please report to author: bad policy [ 3020.867808] usb usb9: usbfs: process 6228 (syz-executor4) did not claim interface 2 before use [ 3020.886097] kernel msg: ebtables bug: please report to author: bad policy 22:57:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3020.918987] usb usb9: usbfs: process 6223 (syz-executor5) did not claim interface 2 before use [ 3020.957897] usb usb9: usbfs: process 6227 (syz-executor3) did not claim interface 0 before use 22:57:11 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1e9}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3020.987561] usb usb9: usbfs: process 6236 (syz-executor4) did not claim interface 2 before use 22:57:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2103001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x2c, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4, 'none\x00', 0x4, 0x8, 0x65}, 0x2c) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r2 = getgid() ioctl$TUNSETGROUP(r1, 0x400454ce, r2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x700000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3021.052517] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3021.070836] usb usb9: usbfs: process 6245 (syz-executor5) did not claim interface 2 before use 22:57:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:11 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x82001) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x1, 0x6, [@random="c4b1313d59cf", @remote, @empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @dev={[], 0x22}, @broadcast]}) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0xffffffffffffffff}) 22:57:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3021.227041] kernel msg: ebtables bug: please report to author: bad policy [ 3021.245859] IPVS: set_ctl: invalid protocol: 44 172.30.1.6:20000 [ 3021.254668] usb usb9: usbfs: process 6264 (syz-executor3) did not claim interface 0 before use [ 3021.265753] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3021.303596] usb usb9: usbfs: process 6262 (syz-executor5) did not claim interface 2 before use 22:57:11 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ea}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3021.345285] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3021.364576] usb usb9: usbfs: process 6274 (syz-executor3) did not claim interface 0 before use 22:57:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3021.393094] usb usb9: usbfs: process 6273 (syz-executor4) did not claim interface 2 before use [ 3021.406727] IPVS: set_ctl: invalid protocol: 44 172.30.1.6:20000 [ 3021.413181] usb usb9: usbfs: process 6279 (syz-executor4) did not claim interface 2 before use [ 3021.434569] usb usb9: usbfs: process 6262 (syz-executor5) did not claim interface 2 before use 22:57:11 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ftruncate(r0, 0x90fe) 22:57:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0xa00000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3021.440157] kernel msg: ebtables bug: please report to author: bad policy 22:57:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x50042, 0x0) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3021.555108] kernel msg: ebtables bug: please report to author: bad policy [ 3021.578393] usb usb9: usbfs: process 6296 (syz-executor4) did not claim interface 2 before use [ 3021.590544] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:11 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1eb}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3021.635308] usb usb9: usbfs: process 6301 (syz-executor3) did not claim interface 0 before use 22:57:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3021.680530] usb usb9: usbfs: process 6305 (syz-executor5) did not claim interface 2 before use [ 3021.717986] usb usb9: usbfs: process 6309 (syz-executor3) did not claim interface 0 before use [ 3021.738752] usb usb9: usbfs: process 6307 (syz-executor4) did not claim interface 2 before use [ 3021.763151] usb usb9: usbfs: process 6319 (syz-executor5) did not claim interface 2 before use [ 3021.765075] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:12 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:audit_spool_t:s0\x00', 0x23) 22:57:12 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000101040, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'netdevsim0\x00', @ifru_flags}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x401, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x6, 0x5, 0x0, 0x7}) ioctl$BLKRAGET(r2, 0x1263, 0x0) write$binfmt_aout(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xad5) 22:57:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x2000000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3021.817302] kernel msg: ebtables bug: please report to author: bad policy 22:57:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:12 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ec}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) r3 = getuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, r3, r4) [ 3021.987249] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3021.999028] usb usb9: usbfs: process 6339 (syz-executor4) did not claim interface 2 before use 22:57:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3022.054649] usb usb9: usbfs: process 6345 (syz-executor3) did not claim interface 0 before use [ 3022.099785] kernel msg: ebtables bug: please report to author: bad policy [ 3022.112777] usb usb9: usbfs: process 6339 (syz-executor4) did not claim interface 2 before use [ 3022.123589] kernel msg: ebtables bug: please report to author: bad policy 22:57:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3022.142874] usb usb9: usbfs: process 6352 (syz-executor3) did not claim interface 0 before use [ 3022.173146] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x3f00000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:12 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) write$cgroup_int(r0, &(0x7f0000000040)=0x1, 0x12) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3022.222244] usb usb9: usbfs: process 6362 (syz-executor5) did not claim interface 2 before use [ 3022.320672] usb usb9: usbfs: process 6374 (syz-executor5) did not claim interface 2 before use [ 3022.335800] kernel msg: ebtables bug: please report to author: bad policy 22:57:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write(r0, &(0x7f0000000140)="182185a8bb801c29d19730a6c47b1dfb64558e3f25619f46e23806e91e7af4713d430ceb81edb8042988b20dce43da6e4b8f12da60201d4683eac64ef2f780c7e9fc3893ce5029ca18ac089c0e774aaf9a097496068b512f0dd3f7b8e19911f1e320da561b599bac7789bf5b804370c5cb2d6ac84abda4359c21b46d94d303adae129e76ddc802832f35dd9b0d7eb6617a90a28d79dd6c8dbaecd0d3bc30f9497166f9f60e2f4d2571a05e2a5567413660eceef88d72399bfe409b4de2d5448cdb7fdf0ea2e57f", 0xc7) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3022.363586] kernel msg: ebtables bug: please report to author: bad policy [ 3022.375553] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3022.387644] usb usb9: usbfs: process 6376 (syz-executor3) did not claim interface 0 before use 22:57:12 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ed}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3022.460559] usb usb9: usbfs: process 6386 (syz-executor5) did not claim interface 2 before use [ 3022.515102] usb usb9: usbfs: process 6386 (syz-executor5) did not claim interface 2 before use 22:57:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x88000, 0x0) finit_module(r0, &(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x2) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000040)={0xa1, 0x2}) socket$inet6_sctp(0xa, 0x1, 0x84) 22:57:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffe, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000000)=0x6) ioctl$BLKRAGET(r1, 0x1263, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x7, [@multicast2, @local, @multicast2, @loopback, @loopback, @initdev={0xac, 0x1e, 0x6, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}]}, 0x2c) sendmsg$rds(r1, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000140)=""/87, 0x57}, {&(0x7f0000000080)=""/40, 0x28}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/167, 0xa7}, {&(0x7f0000001280)=""/166, 0xa6}], 0x5, &(0x7f0000001500)=[@rdma_dest={0x18, 0x114, 0x2, {0xbd, 0x9}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000013c0)=""/91, 0x5b}, &(0x7f0000001440), 0x60}}, @fadd={0x58, 0x114, 0x6, {{0xffffffffffffff0f, 0x3}, &(0x7f0000001480)=0x8000, &(0x7f00000014c0)=0x1, 0x5, 0x5, 0x1b40000000, 0x81, 0x10, 0x1}}], 0xa0, 0x4000000}, 0x1) 22:57:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x4800000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3022.571460] kernel msg: ebtables bug: please report to author: bad policy 22:57:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3022.659518] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3022.675723] usb usb9: usbfs: process 6414 (syz-executor4) did not claim interface 2 before use 22:57:12 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ee}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3022.706682] usb usb9: usbfs: process 6414 (syz-executor4) did not claim interface 2 before use [ 3022.731418] usb usb8: usbfs: process 6419 (syz-executor5) did not claim interface 2 before use 22:57:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x4c00000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:12 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0xfff}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={r1, 0x8000}, 0x8) 22:57:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x80080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3022.837178] kernel msg: ebtables bug: please report to author: bad policy [ 3022.852624] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3022.883016] usb usb9: usbfs: process 6432 (syz-executor4) did not claim interface 2 before use 22:57:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3022.920984] usb usb9: usbfs: process 6434 (syz-executor3) did not claim interface 0 before use 22:57:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3022.977557] kernel msg: ebtables bug: please report to author: bad policy [ 3023.002352] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3023.013975] usb usb9: usbfs: process 6432 (syz-executor4) did not claim interface 2 before use 22:57:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3023.040370] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3023.064648] usb usb9: usbfs: process 6448 (syz-executor3) did not claim interface 0 before use 22:57:13 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1ef}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x6000000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:13 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x802) read(r0, &(0x7f0000000140)=""/167, 0xa7) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) getsockopt$packet_buf(r1, 0x107, 0x1f, &(0x7f0000000040)=""/27, &(0x7f0000000080)=0x1b) [ 3023.120148] usb usb9: usbfs: process 6461 (syz-executor5) did not claim interface 2 before use [ 3023.136324] kernel msg: ebtables bug: please report to author: bad policy 22:57:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f0000000140)=0x4) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000000)={0x1, [0x30, 0x3, 0x9, 0x7, 0x1, 0x8, 0xffff, 0x5, 0x9, 0x4, 0x7, 0x1, 0x4, 0x5, 0x8001, 0x3, 0x6, 0x0, 0x8, 0x4, 0x3, 0x5, 0xffffffffffffff9e, 0x0, 0x5, 0x0, 0xfff, 0x8001, 0x3, 0x3e, 0x101, 0x4, 0x6, 0x45b, 0x100, 0x5, 0xd1d, 0x24, 0x1, 0x10001, 0x8000, 0x0, 0x37, 0x3, 0x1000, 0x100000001, 0x1, 0x50d]}) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="640400006f0200070080040000000500000000000000000400000000000000000000001402000000010000000000000080010000000200009e1c0b8468315640378131c5d2000000000000c34603000000040000000000000060020000000800000000000000"], 0x64) [ 3023.213234] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3023.245943] usb usb9: usbfs: process 6468 (syz-executor4) did not claim interface 2 before use 22:57:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3023.322987] usb usb9: usbfs: process 6476 (syz-executor3) did not claim interface 0 before use [ 3023.353381] usb usb9: usbfs: process 6482 (syz-executor5) did not claim interface 2 before use [ 3023.361817] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:13 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x8) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4000, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000180)=0x7, &(0x7f0000000240)=0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x7fffd}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="00032bbd7000fddbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000040) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3023.376610] kernel msg: ebtables bug: please report to author: bad policy [ 3023.389690] usb usb9: usbfs: process 6490 (syz-executor5) did not claim interface 2 before use [ 3023.393876] kernel msg: ebtables bug: please report to author: bad policy [ 3023.409512] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x601, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040)=0x2, 0x4) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) 22:57:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:13 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1f0}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3023.447370] usb usb9: usbfs: process 6489 (syz-executor3) did not claim interface 0 before use [ 3023.487537] usb usb9: usbfs: process 6499 (syz-executor4) did not claim interface 2 before use 22:57:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x6800000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3023.593796] usb usb9: usbfs: process 6509 (syz-executor5) did not claim interface 2 before use [ 3023.613355] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3023.624152] usb usb9: usbfs: process 6515 (syz-executor4) did not claim interface 2 before use 22:57:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3023.638624] kernel msg: ebtables bug: please report to author: bad policy [ 3023.649568] kernel msg: ebtables bug: please report to author: bad policy [ 3023.658361] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3023.660560] usb usb9: usbfs: process 6512 (syz-executor3) did not claim interface 0 before use 22:57:13 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x400) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0xa0, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3023.723076] usb usb9: usbfs: process 6526 (syz-executor5) did not claim interface 2 before use 22:57:13 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1f1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3023.809718] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x6c00000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:14 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) r2 = getgid() write$FUSE_ATTR(r0, &(0x7f0000000240)={0x78, 0x0, 0x7, {0x1, 0x400, 0x0, {0x2, 0x5, 0x7fffffff, 0x6, 0x6, 0x1, 0xe6c, 0x1, 0x5, 0x10001, 0x5, r1, r2, 0x2e8d, 0x8}}}, 0x78) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r3, 0x1263, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f00000002c0)={{0x456c, 0x5, 0xffffffffffff6184, 0x10001}, 'syz0\x00', 0x30}) 22:57:14 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20\x00', 0x200400, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="736068273e07d82a26125e21813276eb97addae14612a0c84c3380b0c5d075ddf50758d31640eb5a65862370971f0888b9a43ec4a5630625f42aca9e91baa4b11a", 0x41, 0xfffffffffffffff9) r2 = request_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='\x00', 0xfffffffffffffffb) keyctl$link(0x8, r1, r2) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={r3, 0x5}, &(0x7f0000000440)=0x8) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000380), 0x4) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r4, 0x7fffffff}, 0x8) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000180)={0x7, 0x2, 0xb83, 0x2, 0x1}) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3023.999036] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3024.009999] usb usb9: usbfs: process 6556 (syz-executor4) did not claim interface 2 before use 22:57:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x7400000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:14 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1f2}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3024.042131] usb usb9: usbfs: process 6562 (syz-executor4) did not claim interface 2 before use [ 3024.107409] usb usb9: usbfs: process 6560 (syz-executor5) did not claim interface 2 before use [ 3024.155832] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3024.191174] usb usb9: usbfs: process 6566 (syz-executor5) did not claim interface 2 before use [ 3024.200665] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:14 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1f3}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:14 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)={0x2000}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x800, 0x84000) accept4$rose(r1, 0x0, &(0x7f0000000040), 0x80000) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) [ 3024.832395] usb usb9: usbfs: process 6586 (syz-executor4) did not claim interface 2 before use [ 3024.875601] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3024.888210] usb usb9: usbfs: process 6590 (syz-executor5) did not claim interface 2 before use 22:57:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x5, &(0x7f0000000080)=[{0x8000, 0x8, 0x3, 0x2}, {0x4, 0x80000000, 0x0, 0xffff}, {0x101, 0xa33, 0xffff, 0x23}, {0x7e6, 0x3, 0x9, 0x800}, {0x3ff, 0x0, 0x3, 0xa165}]}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x4a0201, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000040)={0x0, 0x7fffffff}) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000180)=0x40) ioctl$BLKRAGET(r1, 0x1263, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000200)) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f00000001c0)=0xff, 0x4) 22:57:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x7a00000000000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3024.921282] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:15 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x6) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 22:57:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:15 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1f4}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@empty, r2}, 0x14) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3025.028148] usb usb9: usbfs: process 6604 (syz-executor5) did not claim interface 2 before use [ 3025.066691] usb usb9: usbfs: process 6607 (syz-executor4) did not claim interface 2 before use [ 3025.141723] usb usb9: usbfs: process 6614 (syz-executor4) did not claim interface 2 before use [ 3025.176093] usb usb9: usbfs: process 6618 (syz-executor5) did not claim interface 2 before use 22:57:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3025.191684] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3025.222277] IPVS: ftp: loaded support on port[0] = 21 [ 3025.311080] IPVS: ftp: loaded support on port[0] = 21 [ 3025.323682] usb usb9: usbfs: process 6628 (syz-executor5) did not claim interface 2 before use [ 3025.339321] usb usb9: usbfs: process 6628 (syz-executor5) did not claim interface 2 before use [ 3025.476627] device bridge_slave_1 left promiscuous mode [ 3025.482146] bridge0: port 2(bridge_slave_1) entered disabled state [ 3025.525384] device bridge_slave_0 left promiscuous mode [ 3025.530900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3025.666536] device hsr_slave_1 left promiscuous mode [ 3025.721290] device hsr_slave_0 left promiscuous mode [ 3025.780038] team0 (unregistering): Port device team_slave_1 removed [ 3025.791257] team0 (unregistering): Port device team_slave_0 removed [ 3025.803348] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3025.861261] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3025.951901] bond0 (unregistering): Released all slaves [ 3026.096643] chnl_net:caif_netlink_parms(): no params data found [ 3026.185916] chnl_net:caif_netlink_parms(): no params data found [ 3026.206995] bridge0: port 1(bridge_slave_0) entered blocking state [ 3026.213603] bridge0: port 1(bridge_slave_0) entered disabled state [ 3026.221309] device bridge_slave_0 entered promiscuous mode [ 3026.233562] bridge0: port 2(bridge_slave_1) entered blocking state [ 3026.240015] bridge0: port 2(bridge_slave_1) entered disabled state [ 3026.247451] device bridge_slave_1 entered promiscuous mode [ 3026.324473] bridge0: port 1(bridge_slave_0) entered blocking state [ 3026.330895] bridge0: port 1(bridge_slave_0) entered disabled state [ 3026.347523] device bridge_slave_0 entered promiscuous mode [ 3026.363226] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3026.373415] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3026.397033] bridge0: port 2(bridge_slave_1) entered blocking state [ 3026.403439] bridge0: port 2(bridge_slave_1) entered disabled state [ 3026.418224] device bridge_slave_1 entered promiscuous mode [ 3026.429164] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3026.436768] team0: Port device team_slave_0 added [ 3026.456267] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3026.463725] team0: Port device team_slave_1 added [ 3026.482705] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3026.492398] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3026.509823] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3026.518607] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3026.549518] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3026.557626] team0: Port device team_slave_0 added [ 3026.563232] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3026.571013] team0: Port device team_slave_1 added [ 3026.583151] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3026.594898] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3026.667268] device hsr_slave_0 entered promiscuous mode [ 3026.704508] device hsr_slave_1 entered promiscuous mode [ 3026.751529] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3026.758854] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3026.807272] device hsr_slave_0 entered promiscuous mode [ 3026.844611] device hsr_slave_1 entered promiscuous mode [ 3026.884820] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3026.891835] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3026.917001] bridge0: port 2(bridge_slave_1) entered blocking state [ 3026.923358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3026.930053] bridge0: port 1(bridge_slave_0) entered blocking state [ 3026.936450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3026.949365] bridge0: port 2(bridge_slave_1) entered blocking state [ 3026.955777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3026.962452] bridge0: port 1(bridge_slave_0) entered blocking state [ 3026.968906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3027.049797] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 3027.056647] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3027.070779] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3027.081649] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3027.091589] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3027.105918] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3027.111991] 8021q: adding VLAN 0 to HW filter on device team0 [ 3027.119406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3027.127745] bridge0: port 1(bridge_slave_0) entered disabled state [ 3027.135681] bridge0: port 2(bridge_slave_1) entered disabled state [ 3027.144768] bridge0: port 1(bridge_slave_0) entered disabled state [ 3027.153505] bridge0: port 2(bridge_slave_1) entered disabled state [ 3027.161978] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3027.188602] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3027.202338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3027.209975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3027.231267] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3027.249324] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3027.261818] 8021q: adding VLAN 0 to HW filter on device team0 [ 3027.270666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3027.287203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3027.300591] bridge0: port 1(bridge_slave_0) entered blocking state [ 3027.306995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3027.325948] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3027.336489] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3027.345845] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3027.356673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3027.363977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3027.372620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3027.381030] bridge0: port 2(bridge_slave_1) entered blocking state [ 3027.387437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3027.395198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3027.403197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3027.411815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3027.419926] bridge0: port 1(bridge_slave_0) entered blocking state [ 3027.426349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3027.433421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3027.442082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3027.450055] bridge0: port 2(bridge_slave_1) entered blocking state [ 3027.456451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3027.466734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3027.477353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3027.493306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3027.501802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3027.520717] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3027.534456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3027.548216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3027.556374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3027.564062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3027.572308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3027.583321] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3027.595054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3027.603320] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3027.613584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3027.622514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3027.635066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3027.642894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3027.651712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3027.660208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3027.669058] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3027.677246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3027.685317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3027.695851] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3027.712352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3027.719596] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3027.734843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3027.742591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3027.751277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3027.759229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3027.771606] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3027.780882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3027.789092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3027.798581] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3027.805317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3027.814123] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3027.820646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3027.845487] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3027.858560] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3027.869588] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3027.893236] 8021q: adding VLAN 0 to HW filter on device batadv0 22:57:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:18 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = inotify_init1(0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f00000005c0)=0x2, 0xfffffd07) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, &(0x7f0000000a40)="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") r6 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000440)) getresuid(&(0x7f0000000380), &(0x7f0000000880), &(0x7f0000001340)) getgid() ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f00000002c0)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000dc0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xffffffe5) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) lstat(&(0x7f0000001600)='./bus\x00', &(0x7f0000001640)) getegid() fcntl$getown(r6, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='\x00', 0x0) ioctl$TIOCGPGRP(r4, 0x540f, 0x0) geteuid() ioctl$TIOCGPGRP(r4, 0x540f, 0x0) fstat(r3, &(0x7f0000001ec0)) getegid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0x50, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r5, 0x0, 0x0, 0x0, r7}, 0x30) lstat(0x0, 0x0) 22:57:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x45, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:18 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1f5}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3027.933598] kernel msg: ebtables bug: please report to author: bad policy 22:57:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) write$FUSE_STATFS(r1, &(0x7f0000000000)={0x60, 0x0, 0x8, {{0x0, 0xfff, 0x2, 0x8, 0x3, 0x882, 0x8, 0x3}}}, 0x60) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004f00), &(0x7f0000004f40)=0xc) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgrp(0x0) r6 = getuid() r7 = getegid() [ 3028.034647] usb usb9: usbfs: process 6651 (syz-executor5) did not claim interface 2 before use sendmsg$netlink(r2, &(0x7f0000004ec0)={0x0, 0x0, &(0x7f0000004e00)=[{&(0x7f0000000140)={0x514, 0x13, 0x100, 0x70bd28, 0x25dfdbff, "", [@generic="70bf0e971a53221f4f8c314d100c9ca8a41b3404b2c3254e0675157d3c0480d7049c9db151f8a4b9c8e383fa4447cbe685436372bc1232bcc06d5b2e544dc1a8157a9f", @nested={0x15c, 0x5a, [@generic="bf4d6caff77b1f412422c84dcdd946d4ce146be2a85adc33a67d5a48903fa8734c80653276259321b3bc146105b92f2014854d67168e6842133dcd4c3084823adbad670ba8b2e0", @generic="f0c47f4eb42da539b4737129b059715b1f0897fb865ec9e459ab7c2aa5ae3fa138e9e9aea903ab4fc82152770eeb7cf88c04dd8315beae0bfa2af412a787e3b7859293300a5f966e9696cb53f6765b2716e128f549397bf3b4526d3af9a88a0c9f6307f66ac7b0d7def2d9c0899f519e29222d6d9d97", @generic="572d45a9a4ae3361d0b3cdbff6fe0bb09c487c58350608f64c416ec2aa5b3e496728d3cd7b51b465b73c51dd65847c1d4c600a8c482e8803a36ec38bce63699d084359a35fb7c285214d621f9fed9682f8ceda022c615375ba8f0f19236732cfe30c2e0ec3bc346d38e02e545c098faf3302c893aa907651fff504", @typed={0x8, 0x42, @pid=r3}, @generic="b3f94968c6d6645f6bf86fddc8dec217e2c02f6935"]}, @typed={0x8, 0x3f, @ipv4=@rand_addr=0x2}, @generic="545855d1ef12bcf4af0f8ddff3c2a12dea01fab1730c9dfa90c886732347", @nested={0x168, 0x5c, [@generic="2d4dcb005434a8bef72c365ec36076868866498fdfd45ce52ee328477d317c3248d7103926452679d5c3d03511a94e3257a4c95b130f28de7325f6e3d7fb991310ccb72e80d6b207515ed04e1441ea9cd520427dd9c65e3fe276bf295b1e955c806526803dd767447e7707fc8d7201b85b6578f3ebe910962de90ac3ba229b35bbf429", @typed={0x4, 0x5c}, @generic="b0e8d7a7402eb17fac14d99f6d026b4535855317eca4a54db6ad719fc9076179046ab0ae4b980f28e2edcac11f96f3ff6156d81c11b694b0aa34390ddac071399e4a893e89b2c5e328ddd114ecf89c15f96c16a54201240e8775e57560240b3d77d0f23190ee5d6e84348c2073a9a243a8cf019a37b376b63991e33054eb93acdda73d5b743d3fb97d8bff431c0cf2b12e14893117be4694d8e6d3974552cfa956c38d31b34a03fceb817e400bd34345ff2bad1398a2bc0e7d848d526e9164660742135697b7dafd9b974b41c89457d7cec8cd8a782965354d3d7001"]}, @nested={0x1d4, 0x8e, [@typed={0x10, 0x5e, @str='ppp1-wlan1\x00'}, @generic="6bbfe3b114292f1197c3122081b9415d096c0cf4a92c398b0cf76b035d119855bdba6276d17eb3dc1b901269d98511db3cd14aba1d632273346ce6714881db60441765ce028db82b92cb45a3cace9c6bddbecca0486207bdabc192f43884e660c320fb65a9a4fc8cf742f62869ab9ee8de6d099a8f423a4f8d83460379f8e6731cf8eab7f6a2186a610d17d6213100c0f832aeaa8e9ed6a79119bda93e1112c6680d723c141742294f6c179c65c7f9908bf5625d884a862e5e9d4bfeae5e8e1b3b9c9bcab922729d0a00261f4c7423", @generic="bfb231079747fe55af0734f95aacb74e1cbe215ea7a1e75e58495e95baa17e6b59472d422bbd44e0cf588251209bc93c21d3c7611e364f2a2ee95ad0b804697ed0af6942a906c39f1470f0cfce8347a5422d362706ffea4bdae1c2866db6eb193ac89d52bb8a44600e8a71d61383dcf42db033104e0c84ca9ad07c0c3cfefc79d359f80b2f2efb448a5589e98da150fd9a7c881f0947ec5d413f08122454622f6530eafcbce9319c8fadd5da4b67ef40e60d053ff085e89dac28f144ba060a10f74b0ecebe2a20f5bec20b5a3fdb806a6b4df418dc5f5957fce6860f25ffbe05236ca82abd842b737a9e114a3c59b59633", @generic]}]}, 0x514}, {&(0x7f0000000740)=ANY=[@ANYBLOB="a4460000360000002abd7000ffdbdf25632c93343d77b8a9004bd2aa90bf602ef2302f322c00f44d15b015bb74df0848ddbada01912c6f0d8220fe7474b6d80b39ac6ee7222696cde4d8f27c9840be9d9db0083c1096179f7c10f504b17e295081271f3288a6c75b3644cc15702284d91253e563511d4c0bf233bbf8006f0008004f00", @ANYRES32=r1, @ANYBLOB="08003900ac1e0001080070000800000008001100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB='\b\x00C\x00', @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="080022007f0000000c007f00ff7f000000000000000000"], 0x46a4}], 0x2, &(0x7f0000004e40)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x28, 0x1, 0x1, [r0, r1, r2, r1, r0, r1]}], 0x48, 0x4000}, 0x4000) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000004f80)={0x0, 0x0, [], @raw_data=[0x1, 0x47a8000, 0x2, 0xff, 0x81, 0x3, 0x8, 0x80, 0x3, 0x80000001, 0x4, 0x7, 0x3, 0x8001, 0x2, 0x7566, 0x5, 0x0, 0x48, 0x1, 0x5, 0xfff, 0x7, 0x1, 0x2, 0x40, 0x101, 0x81, 0x5237, 0x4, 0xb55, 0x4800000000]}) ioctl$BLKRAGET(r2, 0x1263, 0x0) [ 3028.118547] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3028.157674] kernel msg: ebtables bug: please report to author: bad policy [ 3028.166715] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3028.192535] kernel msg: ebtables bug: please report to author: bad policy [ 3028.239864] usb usb9: usbfs: process 6664 (syz-executor3) did not claim interface 0 before use 22:57:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:18 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1f6}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3028.288925] usb usb9: usbfs: process 6674 (syz-executor3) did not claim interface 0 before use 22:57:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) socket$pptp(0x18, 0x1, 0x2) [ 3028.357840] usb usb9: usbfs: process 6676 (syz-executor5) did not claim interface 2 before use 22:57:18 executing program 4: openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) [ 3028.435276] kernel msg: ebtables bug: please report to author: bad policy 22:57:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3028.498368] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3028.502533] usb usb9: usbfs: process 6692 (syz-executor3) did not claim interface 0 before use [ 3028.520719] kernel msg: ebtables bug: please report to author: bad policy [ 3028.527396] usb usb9: usbfs: process 6697 (syz-executor3) did not claim interface 0 before use [ 3028.572680] usb usb9: usbfs: process 6701 (syz-executor5) did not claim interface 2 before use 22:57:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:18 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x2, 0x8, 0x7, 0x1, 0x6}) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x1ff, 0x7, 0x1f, 0x401, 0x100, 0xfffffffffffffffa}) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000040), 0x4) [ 3028.627538] usb usb9: usbfs: process 6708 (syz-executor5) did not claim interface 2 before use [ 3028.638207] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:18 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1f7}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:18 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000000)={0x4, 0x5, 0x80000000, 0xb9c}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) 22:57:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3028.756285] usb usb9: usbfs: process 6717 (syz-executor3) did not claim interface 0 before use 22:57:19 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3028.810982] kernel msg: ebtables bug: please report to author: bad policy [ 3028.817139] usb usb9: usbfs: process 6725 (syz-executor3) did not claim interface 0 before use [ 3028.830745] kernel msg: ebtables bug: please report to author: bad policy [ 3028.846821] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3028.876246] usb usb9: usbfs: process 6733 (syz-executor4) did not claim interface 2 before use [ 3028.886027] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3028.925168] device bridge_slave_1 left promiscuous mode [ 3028.933382] usb usb9: usbfs: process 6737 (syz-executor5) did not claim interface 2 before use [ 3028.935279] bridge0: port 2(bridge_slave_1) entered disabled state 22:57:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x80000028000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000400)={0x2, 0x1, &(0x7f0000000300)=""/226, &(0x7f0000000040)=""/79, &(0x7f0000000140)=""/22, 0x10f000}) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x303000, 0x0) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000200)=0x1, 0x4) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="800000002400000828bd7000ffc5df00", @ANYRES32=r3, @ANYBLOB="ffff0600fbff00000000060008000d000008000008000100636271003c000200100003000e00f7ff0000001201000000180001003201120e9f00000004c1e62c0300000005080000100003000800ffff010000000000000008000e000400000008000d0006000000f8d706ab540abd07d28e5644c51a8a10e813199915b05c6917120ad279d46810d707a14947"], 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x40) ioctl$BLKRAGET(r1, 0x1263, 0x0) vmsplice(r2, &(0x7f0000000600)=[{&(0x7f0000000580)="1ac256e3ac77592ac73b8b78b03279194e8a6827779fd99b4fe8c59ef0f8cec4bfa04947e4aa37b8ff17347fe126ed4f7f2e603e4b98d2a4ac1222fb23a9471e561fb1", 0x43}], 0x1, 0x4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="1fb68672e19109fd2000010000040080020008000500"], &(0x7f0000000540)=0x16) [ 3028.966731] usb usb9: usbfs: process 6733 (syz-executor4) did not claim interface 2 before use [ 3028.977983] usb usb9: usbfs: process 6746 (syz-executor5) did not claim interface 2 before use 22:57:19 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffffffffffffc, 0x800) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000080)={0x8001005, 0x73f, 0x1}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0xffffffffffff7fff, 0x3, 'client0\x00', 0x6, "6441af852ba7fe1d", "0f73584800bf1f82eaccc715ca6c3c22e2ff25eeb7001f5836901a200df177c4", 0xa46, 0x80}) r2 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x203) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3029.012899] usb usb9: usbfs: process 6749 (syz-executor3) did not claim interface 0 before use [ 3029.023385] device bridge_slave_0 left promiscuous mode [ 3029.023803] kernel msg: ebtables bug: please report to author: bad policy [ 3029.030369] bridge0: port 1(bridge_slave_0) entered disabled state [ 3029.101594] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3029.121368] usb usb9: usbfs: process 6760 (syz-executor5) did not claim interface 2 before use 22:57:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3029.149654] usb usb9: usbfs: process 6760 (syz-executor5) did not claim interface 2 before use 22:57:19 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x8) r1 = getuid() ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000400)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r1}) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f00000003c0)={0xa1, 0x2, 0x0, 0x543, 0x4}) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0xfff, 0x3, &(0x7f0000000300)=[{&(0x7f0000000140)="21e0d5a49324c8d622f295a67d818bf65b1fa09fcbc304dbbc9cf3fc4e4426c37dd4952be58ec22fabfcb509d9a06c1f30ab0430289199dc341f214f77eb1b9fb34094de063c2e672a77eaef4f5b8710132b7affc642022dcf0708fc192807d2b81988d5566d1a9c4607c71d889012828eebe8ef61577cf7da6ade9f761ec3f2cc4922fe72f1007df0be48354848e105c4d3787a6c1348d472cecd1030596371b0b8e2c821fbdebb1eb2c7f71c509fc2f77e899a5111eaeaa1fdfe60c7f205d0bbde19d024084721712da09f9e8c9feb38802fc01f1ebade", 0xd8, 0x1000}, {&(0x7f00000000c0)="d6cf730b0dfe5d58aa28308286a887433eec996d61a614", 0x17, 0xc074}, {&(0x7f0000000240)="7e37ecacf81afe9fdd3590cbe3760b2eaef45a338e11436426560d1702813c3fd4e5f2ee71e7e93f5f654b3beda5d4b299caed9e8cecac9e851be22812fa4bbeb730dd072d92aafa30d9db350ab8a904c6a9c98e64a6c5e0ca33cde02bcc25a82c53ccf20d34cdc652e53555762bf645a09e28164415b9d57fd10023d4ad987acb27ed", 0x83, 0xeaa}], 0x800, &(0x7f0000000380)='\x00') [ 3029.261758] usb usb9: usbfs: process 6772 (syz-executor4) did not claim interface 2 before use 22:57:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept$packet(0xffffffffffffff9c, &(0x7f0000001640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001680)=0x14) r2 = getpgrp(0xffffffffffffffff) sched_setaffinity(r2, 0x8, &(0x7f0000000000)=0x3) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000016c0)={'syz_tun\x00', r1}) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r3, 0x1263, 0x0) [ 3029.302694] usb usb9: usbfs: process 6774 (syz-executor5) did not claim interface 2 before use [ 3029.357154] usb usb7: usbfs: process 6779 (syz-executor4) did not claim interface 2 before use [ 3029.408620] device hsr_slave_1 left promiscuous mode [ 3029.427716] usb usb9: usbfs: process 6784 (syz-executor5) did not claim interface 2 before use [ 3029.440089] usb usb9: usbfs: process 6786 (syz-executor5) did not claim interface 2 before use [ 3029.457381] device hsr_slave_0 left promiscuous mode [ 3029.463882] usb usb7: usbfs: process 6788 (syz-executor4) did not claim interface 2 before use [ 3029.500767] team0 (unregistering): Port device team_slave_1 removed [ 3029.550092] team0 (unregistering): Port device team_slave_0 removed [ 3029.566923] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3029.594581] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3029.694768] bond0 (unregistering): Released all slaves 22:57:20 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1f8}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0x7d, &(0x7f0000000000), &(0x7f0000000040)=0xb) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) 22:57:20 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x5}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x1}) 22:57:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3029.812603] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:20 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3029.939573] kernel msg: ebtables bug: please report to author: bad policy [ 3029.952899] usb usb9: usbfs: process 6804 (syz-executor4) did not claim interface 5 before use [ 3029.960571] kernel msg: ebtables bug: please report to author: bad policy [ 3029.972998] usb usb9: usbfs: process 6805 (syz-executor3) did not claim interface 0 before use 22:57:20 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3029.992927] usb usb9: usbfs: process 6802 (syz-executor5) did not claim interface 2 before use [ 3030.006943] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3030.019084] usb usb9: usbfs: process 6819 (syz-executor4) did not claim interface 5 before use 22:57:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3030.056785] usb usb9: usbfs: process 6815 (syz-executor3) did not claim interface 0 before use [ 3030.093104] usb usb9: usbfs: process 6818 (syz-executor5) did not claim interface 2 before use 22:57:20 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x9, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x3}) 22:57:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = memfd_create(&(0x7f0000000000)='\\cgroupuser+[keyring*\x00', 0x2) ioctl(r0, 0x5, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x40) finit_module(r1, &(0x7f0000000080)='\x00', 0x2) [ 3030.165375] kernel msg: ebtables bug: please report to author: bad policy [ 3030.178732] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:20 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1f9}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3030.224377] kernel msg: ebtables bug: please report to author: bad policy [ 3030.248077] usb usb9: usbfs: process 6838 (syz-executor3) did not claim interface 0 before use 22:57:20 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3030.317582] usb usb9: usbfs: process 6840 (syz-executor3) did not claim interface 0 before use [ 3030.357209] usb usb9: usbfs: process 6849 (syz-executor4) did not claim interface 2 before use [ 3030.388856] usb usb9: usbfs: process 6850 (syz-executor5) did not claim interface 2 before use 22:57:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x20000001a1, 0x2, 0x0, 0x4}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x2, 0x2, 0xf000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3030.434399] usb usb9: usbfs: process 6855 (syz-executor4) did not claim interface 2 before use 22:57:20 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3030.510830] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3030.547182] kernel msg: ebtables bug: please report to author: bad policy [ 3030.576684] usb usb9: usbfs: process 6866 (syz-executor3) did not claim interface 0 before use [ 3030.613784] kernel msg: ebtables bug: please report to author: bad policy 22:57:20 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:20 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1fa}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3030.634456] usb usb9: usbfs: process 6869 (syz-executor3) did not claim interface 0 before use 22:57:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:20 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) io_setup(0x757, &(0x7f0000000000)=0x0) io_cancel(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x20, r0, &(0x7f0000000040)="6c5e4cbfc43b4a6dc573ef58a8afa928c915970bf9d34bc0222a2e6158c241cbc3af203e205380b2c9a35cc0c98658e5fd6cf1233df8151077d632", 0x3b, 0x320b, 0x0, 0x2, r0}, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3030.798444] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3030.866068] kernel msg: ebtables bug: please report to author: bad policy [ 3030.887165] usb usb9: usbfs: process 6895 (syz-executor3) did not claim interface 0 before use 22:57:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3030.918341] kernel msg: ebtables bug: please report to author: bad policy [ 3030.946700] usb usb9: usbfs: process 6899 (syz-executor4) did not claim interface 2 before use 22:57:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3030.993468] usb usb9: usbfs: process 6904 (syz-executor3) did not claim interface 0 before use 22:57:21 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1fb}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3031.087189] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3031.116315] kernel msg: ebtables bug: please report to author: bad policy 22:57:21 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x7e9, 0xb, 0x4, 0x0, {0x77359400}, {0x5, 0x0, 0xffffffffffff0001, 0x0, 0x1a718b70, 0x2, "c69739a7"}, 0x80000001, 0x3, @fd=r0, 0x4}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0xa1, 0x0, 0xf7, 0x100}) poll(&(0x7f0000000000)=[{r0}, {r0, 0x400}, {r0}, {r0, 0x130}, {r0}, {r0, 0x1}, {r0}, {r0, 0x4180}], 0x8, 0x100000000) [ 3031.150873] kernel msg: ebtables bug: please report to author: bad policy 22:57:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3031.198456] usb usb9: usbfs: process 6926 (syz-executor3) did not claim interface 0 before use 22:57:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x8000002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3031.249374] usb usb9: usbfs: process 6931 (syz-executor4) did not claim interface 0 before use [ 3031.314404] usb usb9: usbfs: process 6940 (syz-executor4) did not claim interface 0 before use [ 3031.354128] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:21 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1fc}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3031.415091] kernel msg: ebtables bug: please report to author: bad policy [ 3031.453154] usb usb9: usbfs: process 6948 (syz-executor3) did not claim interface 0 before use 22:57:21 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x4200, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0x2fb34b35, 0x2, 0x0, 0xfffffffffffffffd}) [ 3031.516249] usb usb9: usbfs: process 6953 (syz-executor3) did not claim interface 0 before use 22:57:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3031.664129] vhci_hcd: default hub control req: 354b v2fb3 i0002 l0 [ 3031.679306] kernel msg: ebtables bug: please report to author: bad policy 22:57:21 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1fd}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3031.719368] vhci_hcd: default hub control req: 354b v2fb3 i0002 l0 [ 3031.749004] kernel msg: ebtables bug: please report to author: bad policy 22:57:21 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3031.781728] usb usb9: usbfs: process 6971 (syz-executor3) did not claim interface 0 before use 22:57:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:22 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0xfffffffffffffffd) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x6, {0x100000000}}, 0x18) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) 22:57:22 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa1, 0x2, 0x0, 0xceb, 0xfffffffffffffffd}) [ 3031.995329] usb usb9: usbfs: process 6984 (syz-executor3) did not claim interface 0 before use [ 3032.026088] kernel msg: ebtables bug: please report to author: bad policy [ 3032.043340] usb usb9: usbfs: process 6991 (syz-executor4) did not claim interface 2 before use [ 3032.067017] usb usb9: usbfs: process 6992 (syz-executor3) did not claim interface 0 before use [ 3032.078157] kernel msg: ebtables bug: please report to author: bad policy [ 3032.103283] usb usb9: usbfs: process 6994 (syz-executor4) did not claim interface 2 before use 22:57:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x4101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) write$P9_RSTATu(r1, &(0x7f0000000340)={0xa6, 0x7d, 0x2, {{0x0, 0x7c, 0x6, 0x6b, {0x80, 0x3}, 0x0, 0x38ea, 0x6, 0x6, 0x1e, ',]\\em0#ppp1]bdevvmnet0locgroup', 0x1, '$', 0x15, '/dev/bus/usb/00#/00#\x00', 0x15, '/dev/bus/usb/00#/00#\x00'}, 0x15, '/dev/bus/usb/00#/00#\x00', r2, r3, r4}}, 0xa6) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:22 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x1fe}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:22 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:22 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000000)={0x6, 'syz0\x00\x7f\x90\xee\xdf\x00'}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x5}) [ 3032.917162] usb usb9: usbfs: process 7007 (syz-executor3) did not claim interface 0 before use [ 3032.935618] kernel msg: ebtables bug: please report to author: bad policy [ 3032.952563] usb usb9: usbfs: process 7011 (syz-executor4) did not claim interface 5 before use [ 3032.969191] kernel msg: ebtables bug: please report to author: bad policy [ 3032.997811] usb usb9: usbfs: process 7013 (syz-executor3) did not claim interface 0 before use 22:57:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3033.024781] usb usb9: usbfs: process 7018 (syz-executor4) did not claim interface 5 before use 22:57:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:23 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x201}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:23 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000000)={{0x9, 0x5}, {0x100000000, 0x401}, 0x1, 0x2}) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000080)={0x2, 0x376, 0x2, 0xfffffffffffffffb, 0x2, 0x100000001}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3033.186684] kernel msg: ebtables bug: please report to author: bad policy [ 3033.192820] IPVS: ftp: loaded support on port[0] = 21 [ 3033.224922] usb usb9: usbfs: process 7030 (syz-executor3) did not claim interface 0 before use 22:57:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3033.259778] IPVS: ftp: loaded support on port[0] = 21 [ 3033.260297] kernel msg: ebtables bug: please report to author: bad policy [ 3033.281493] usb usb9: usbfs: process 7039 (syz-executor3) did not claim interface 0 before use [ 3033.347299] usb usb9: usbfs: process 7041 (syz-executor4) did not claim interface 2 before use 22:57:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3033.528648] usb usb9: usbfs: process 7050 (syz-executor3) did not claim interface 0 before use [ 3033.575098] kernel msg: ebtables bug: please report to author: bad policy [ 3033.611219] usb usb9: usbfs: process 7059 (syz-executor3) did not claim interface 0 before use [ 3033.611547] kernel msg: ebtables bug: please report to author: bad policy [ 3033.709630] chnl_net:caif_netlink_parms(): no params data found [ 3033.744504] chnl_net:caif_netlink_parms(): no params data found [ 3033.819193] bridge0: port 1(bridge_slave_0) entered blocking state [ 3033.826002] bridge0: port 1(bridge_slave_0) entered disabled state [ 3033.833434] device bridge_slave_0 entered promiscuous mode [ 3033.840885] bridge0: port 1(bridge_slave_0) entered blocking state [ 3033.847732] bridge0: port 1(bridge_slave_0) entered disabled state [ 3033.855387] device bridge_slave_0 entered promiscuous mode [ 3033.862690] bridge0: port 2(bridge_slave_1) entered blocking state [ 3033.869798] bridge0: port 2(bridge_slave_1) entered disabled state [ 3033.877277] device bridge_slave_1 entered promiscuous mode [ 3033.884457] bridge0: port 2(bridge_slave_1) entered blocking state [ 3033.890830] bridge0: port 2(bridge_slave_1) entered disabled state [ 3033.898546] device bridge_slave_1 entered promiscuous mode [ 3033.932452] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3033.942343] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3033.952504] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3033.962191] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3033.996872] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3034.004561] team0: Port device team_slave_0 added [ 3034.009964] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3034.017541] team0: Port device team_slave_0 added [ 3034.022919] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3034.030853] team0: Port device team_slave_1 added [ 3034.036491] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3034.043893] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3034.051356] team0: Port device team_slave_1 added [ 3034.056992] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3034.064549] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3034.072003] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3034.137882] device hsr_slave_0 entered promiscuous mode [ 3034.194603] device hsr_slave_1 entered promiscuous mode [ 3034.287268] device hsr_slave_0 entered promiscuous mode [ 3034.324598] device hsr_slave_1 entered promiscuous mode [ 3034.394849] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3034.401850] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3034.409282] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3034.416919] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3034.448746] bridge0: port 2(bridge_slave_1) entered blocking state [ 3034.455160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3034.461801] bridge0: port 1(bridge_slave_0) entered blocking state [ 3034.468268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3034.478929] bridge0: port 2(bridge_slave_1) entered blocking state [ 3034.485317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3034.491957] bridge0: port 1(bridge_slave_0) entered blocking state [ 3034.498365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3034.574095] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 3034.581900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3034.603350] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3034.613810] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 3034.620032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3034.631742] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3034.642446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3034.652735] bridge0: port 1(bridge_slave_0) entered disabled state [ 3034.659849] bridge0: port 2(bridge_slave_1) entered disabled state [ 3034.667277] bridge0: port 1(bridge_slave_0) entered disabled state [ 3034.674106] bridge0: port 2(bridge_slave_1) entered disabled state [ 3034.683050] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3034.690097] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3034.703736] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3034.710208] 8021q: adding VLAN 0 to HW filter on device team0 [ 3034.718247] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3034.738545] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3034.746305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3034.753379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3034.760932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3034.769473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3034.777600] bridge0: port 1(bridge_slave_0) entered blocking state [ 3034.783934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3034.794028] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3034.800612] 8021q: adding VLAN 0 to HW filter on device team0 [ 3034.820848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3034.830058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3034.838591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3034.846685] bridge0: port 2(bridge_slave_1) entered blocking state [ 3034.853019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3034.873263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3034.883773] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3034.893897] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3034.903602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3034.913110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3034.921206] bridge0: port 1(bridge_slave_0) entered blocking state [ 3034.927632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3034.936791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3034.944859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3034.955545] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3034.963801] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3034.983225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3034.991117] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3034.998829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3035.006959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3035.015139] bridge0: port 2(bridge_slave_1) entered blocking state [ 3035.021502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3035.028692] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3035.039095] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3035.046902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3035.055130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3035.067134] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3035.075526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3035.082368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3035.090877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3035.099124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3035.120851] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3035.131275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3035.140158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3035.149914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3035.160172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3035.169699] device bridge_slave_1 left promiscuous mode [ 3035.175831] bridge0: port 2(bridge_slave_1) entered disabled state [ 3035.225460] device bridge_slave_0 left promiscuous mode [ 3035.230920] bridge0: port 1(bridge_slave_0) entered disabled state [ 3035.296718] device bridge_slave_1 left promiscuous mode [ 3035.302241] bridge0: port 2(bridge_slave_1) entered disabled state [ 3035.335583] device bridge_slave_0 left promiscuous mode [ 3035.341048] bridge0: port 1(bridge_slave_0) entered disabled state [ 3035.557564] device hsr_slave_1 left promiscuous mode [ 3035.610470] device hsr_slave_0 left promiscuous mode [ 3035.647791] team0 (unregistering): Port device team_slave_1 removed [ 3035.661369] team0 (unregistering): Port device team_slave_0 removed [ 3035.672339] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3035.712711] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3035.809799] bond0 (unregistering): Released all slaves [ 3035.967916] device hsr_slave_1 left promiscuous mode [ 3036.030816] device hsr_slave_0 left promiscuous mode [ 3036.098010] team0 (unregistering): Port device team_slave_1 removed [ 3036.112217] team0 (unregistering): Port device team_slave_0 removed [ 3036.125735] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3036.161189] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3036.242868] bond0 (unregistering): Released all slaves [ 3036.340470] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3036.347166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3036.366219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3036.377266] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3036.383506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3036.391535] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3036.399840] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3036.409529] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3036.420418] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3036.430196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3036.438857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3036.446968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3036.455022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3036.465237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3036.478502] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3036.486434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3036.502459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3036.512469] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3036.527953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3036.563607] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3036.576056] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3036.606710] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3036.618247] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:26 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x2, 0x2, 0x0, 0x0, 0x1}) ioctl(r0, 0x0, &(0x7f0000000000)="15a8835f30e3a663c7fb2775503d5fdfe592b31d194039d5b6e8d501c6ea6ffc7e1984efb1c2934070a131629673ac1319ab6a5505ed6a67a8c6e25b58928118831d9db0177084ae3cf9c1cede7c955c8f7e802b") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x4, 0x0) 22:57:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x1}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:26 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x202}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3036.676842] usb usb9: usbfs: process 7081 (syz-executor5) did not claim interface 2 before use 22:57:26 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000000000003, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) [ 3036.752927] usb usb9: usbfs: process 7098 (syz-executor5) did not claim interface 2 before use [ 3036.775630] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3036.793229] kernel msg: ebtables bug: please report to author: bad policy 22:57:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000140)={{0x0, 0x1, 0x7fffffff, 0x40, 'syz1\x00', 0x9}, 0x0, [0x3, 0x8000, 0xfffffffffffffff8, 0x2, 0x5, 0x8, 0x10000, 0x5, 0x80000001, 0xa303, 0x100000000, 0x8, 0xb9, 0x6, 0xfff, 0x0, 0x400, 0x2, 0x1f, 0x9, 0x5, 0x80000000, 0xbbdc, 0x3, 0x7, 0x3, 0xffffffff, 0x5, 0x1, 0x4, 0x6, 0xff, 0x100000001, 0xffffffffffff8000, 0xfffffffffffffeff, 0x7, 0x5, 0x6, 0x6, 0x7, 0x1, 0x8000, 0x3, 0x6, 0xfe38, 0x0, 0x1f, 0x4, 0x81, 0xaf4, 0x1, 0x7, 0x2, 0xffffffffffffffe0, 0x3, 0x1ce3, 0x4e0c, 0x5, 0xfffffffffffff3ee, 0x2, 0x2, 0xffff, 0x2, 0x80000000, 0x6, 0x101, 0x9, 0x10000, 0xffffffffffff3a64, 0x9, 0x1, 0x4, 0x61, 0x0, 0xfff, 0xb02, 0x0, 0x6, 0x4, 0xf0f7, 0x6840, 0x8, 0xffffffffffffff1c, 0x9241, 0x6, 0x401, 0x100000000, 0x0, 0x0, 0x5, 0x6, 0x2, 0x6, 0x1, 0x2, 0xffffffff, 0x1000, 0xffffffff, 0xf6, 0x2, 0x0, 0x0, 0x6, 0x8, 0x721, 0x0, 0x7, 0xff, 0x101, 0x6, 0x5, 0x7, 0x0, 0x6, 0x3, 0x6, 0x1, 0x7ff, 0x7, 0x2, 0x2, 0x10000, 0x7fff, 0x8, 0x6, 0xfc3, 0x3, 0xedc]}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)=0x4) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3036.806544] usb usb9: usbfs: process 7106 (syz-executor5) did not claim interface 2 before use [ 3036.823522] usb usb9: usbfs: process 7108 (syz-executor3) did not claim interface 0 before use 22:57:27 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x3, 0x7fffe) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3036.902989] kernel msg: ebtables bug: please report to author: bad policy [ 3036.911295] usb usb9: usbfs: process 7108 (syz-executor3) did not claim interface 0 before use 22:57:27 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x203}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3036.953606] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3037.005052] usb usb9: usbfs: process 7115 (syz-executor5) did not claim interface 2 before use 22:57:27 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40000, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000140)={0x6, 0x1}) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000040)=""/85) [ 3037.049624] kernel msg: ebtables bug: please report to author: bad policy 22:57:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0a85322, &(0x7f00000002c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) 22:57:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3037.093755] kernel msg: ebtables bug: please report to author: bad policy [ 3037.132469] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3037.166491] usb usb9: usbfs: process 7147 (syz-executor4) did not claim interface 2 before use 22:57:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3037.230780] usb usb9: usbfs: process 7154 (syz-executor5) did not claim interface 2 before use 22:57:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0xff, &(0x7f0000000200)=0x0) io_getevents(r1, 0x6, 0x4, &(0x7f0000000240)=[{}, {}, {}, {}], &(0x7f00000002c0)) r2 = getpid() waitid(0x1, r2, 0x0, 0x8000000a, &(0x7f0000000000)) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000140)=""/104) close(r0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x4, 0x101, 0x80000}) syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x6, 0x0) mq_timedreceive(r3, &(0x7f0000000300)=""/14, 0xe, 0xa7b, &(0x7f0000000340)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000001c0)={0x2, 0x9, 0xf3b8, 0x7fffffff, 0xdc2a}) ioctl$BLKRAGET(r3, 0x1263, 0x0) [ 3037.271878] usb usb9: usbfs: process 7151 (syz-executor3) did not claim interface 0 before use [ 3037.283886] kernel msg: ebtables bug: please report to author: bad policy [ 3037.296332] usb usb9: usbfs: process 7147 (syz-executor4) did not claim interface 2 before use 22:57:27 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x204}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3037.312318] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3037.327092] usb usb9: usbfs: process 7163 (syz-executor3) did not claim interface 0 before use [ 3037.345396] kernel msg: ebtables bug: please report to author: bad policy 22:57:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000140)=""/219) 22:57:27 executing program 4: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @empty}, &(0x7f0000000080)=0x10, 0x0) pwrite64(r0, &(0x7f0000000140)="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", 0x1000, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40020ffffff, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) write$P9_RFLUSH(r1, &(0x7f0000001140)={0x7, 0x6d, 0x1}, 0x7) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000000)) [ 3037.453880] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3037.506303] kernel msg: ebtables bug: please report to author: bad policy [ 3037.519899] usb usb9: usbfs: process 7182 (syz-executor3) did not claim interface 0 before use [ 3037.566330] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:27 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x205}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:27 executing program 4: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1ff, 0xa0000) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0xa1, 0x2, 0x0, 0x20, 0x7f}) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x73eb, 0xe61e}) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 22:57:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3037.672454] usb usb9: usbfs: process 7201 (syz-executor5) did not claim interface 2 before use [ 3037.683083] kernel msg: ebtables bug: please report to author: bad policy [ 3037.736418] usb usb9: usbfs: process 7207 (syz-executor4) did not claim interface 2 before use [ 3037.790093] usb usb9: usbfs: process 7212 (syz-executor3) did not claim interface 0 before use [ 3037.814284] usb usb9: usbfs: process 7210 (syz-executor5) did not claim interface 2 before use 22:57:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3037.841381] usb usb9: usbfs: process 7215 (syz-executor4) did not claim interface 2 before use [ 3037.858023] kernel msg: ebtables bug: please report to author: bad policy [ 3037.865593] usb usb9: usbfs: process 7219 (syz-executor3) did not claim interface 0 before use 22:57:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xff, 0xc0) 22:57:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3037.897496] kernel msg: ebtables bug: please report to author: bad policy [ 3037.923475] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:28 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x100000000, 0x0, 0x2, 0x2, 0x3, [{0x8, 0x1, 0xb8b, 0x0, 0x0, 0x102}, {0x100000000, 0x7fff, 0x0, 0x0, 0x0, 0x108}, {0x5, 0x7a8, 0x96, 0x0, 0x0, 0x4}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000140)=0x1, 0x4) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000002c0)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000300)=r2) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000000000)={0xcf8, "3a70894139ede77493428f5bc12dfaae19666c5d749f08b0918b6025d6050be5", 0x2, 0x40, 0x5, 0x200000, 0x100, 0x4}) [ 3037.996204] usb usb9: usbfs: process 7236 (syz-executor5) did not claim interface 2 before use [ 3038.072621] usb usb9: usbfs: process 7247 (syz-executor5) did not claim interface 2 before use [ 3038.103962] kernel msg: ebtables bug: please report to author: bad policy 22:57:28 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x206}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x60000fffffb, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1, 0x0) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3038.128002] usb usb9: usbfs: process 7245 (syz-executor4) did not claim interface 2 before use [ 3038.161275] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3038.173718] usb usb9: usbfs: process 7252 (syz-executor3) did not claim interface 0 before use [ 3038.191923] usb usb9: usbfs: process 7260 (syz-executor4) did not claim interface 2 before use 22:57:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3038.219204] kernel msg: ebtables bug: please report to author: bad policy [ 3038.234307] usb usb9: usbfs: process 7263 (syz-executor3) did not claim interface 0 before use 22:57:28 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180)={0x0, 0xc, 0x7, @thr={&(0x7f0000000040)="280bd86ca25d34d12b1e51cbd851715bc2ec71ee21cb34aaa80550e6c93dd4122e310bb61c67ba86df12804c072fdfb00a21d21a74fb88423aa7dfcb06ab50656e53ed86dd65ba33402646646cdfe0efcdaad03ba3613db4b9ed7c4a6afc1beb", &(0x7f00000000c0)="1b6b7a266caeb229f6890a1b3e64dbc28f92c5f32547e9a5dd58074f489cd05fe861a03306dafe7e431e570f557ae774e50a6348fda0e06476831e4e6a9388e7292862e3de48a22d3fec9c30e099fc6b6c8d667fbc0fa377ae69dd9b7dbdeaf34d4b1a00bafc8834d873243afece19e54a475e1a3aacd8fb9634c43e03fc16d287d4dc3f96aa4b62"}}, &(0x7f00000001c0)=0x0) timer_gettime(r0, &(0x7f0000000200)) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x10000) 22:57:28 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2086458f, 0x200000) [ 3038.410837] kernel msg: ebtables bug: please report to author: bad policy [ 3038.441641] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3038.443017] usb usb9: usbfs: process 7279 (syz-executor3) did not claim interface 0 before use [ 3038.475752] kernel msg: ebtables bug: please report to author: bad policy 22:57:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:28 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x207}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:28 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000000)=""/102) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x20, 0x80004}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3038.525269] usb usb9: usbfs: process 7296 (syz-executor4) did not claim interface 2 before use [ 3038.561632] usb usb9: usbfs: process 7287 (syz-executor3) did not claim interface 0 before use 22:57:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3038.629541] usb usb9: usbfs: process 7303 (syz-executor4) did not claim interface 2 before use [ 3038.665911] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:28 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x100fd) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000000)) [ 3038.716356] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3038.735572] kernel msg: ebtables bug: please report to author: bad policy [ 3038.743775] usb usb9: usbfs: process 7314 (syz-executor5) did not claim interface 2 before use 22:57:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3038.834939] kernel msg: ebtables bug: please report to author: bad policy [ 3038.846513] usb usb9: usbfs: process 7327 (syz-executor3) did not claim interface 0 before use [ 3038.873453] usb usb9: usbfs: process 7314 (syz-executor5) did not claim interface 2 before use 22:57:29 executing program 4: ioctl$VIDIOC_EXPBUF(0xffffffffffffff9c, 0xc0405610, &(0x7f0000000000)={0xa, 0x7, 0x0, 0x0, 0xffffffffffffffff}) fcntl$addseals(r0, 0x409, 0x1) fcntl$setpipe(r0, 0x407, 0x30) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:29 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x208}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) write$P9_RREADLINK(r1, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, r1, 0x0) 22:57:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3039.019155] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3039.063736] usb usb9: usbfs: process 7345 (syz-executor4) did not claim interface 2 before use [ 3039.093769] usb usb9: usbfs: process 7346 (syz-executor3) did not claim interface 0 before use [ 3039.110603] usb usb9: usbfs: process 7348 (syz-executor4) did not claim interface 2 before use [ 3039.125756] usb usb9: usbfs: process 7349 (syz-executor5) did not claim interface 2 before use [ 3039.145338] usb usb9: usbfs: process 7351 (syz-executor3) did not claim interface 0 before use 22:57:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3039.162136] usb usb9: usbfs: process 7349 (syz-executor5) did not claim interface 2 before use 22:57:29 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0xc, 0x2100) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000040)={0x40, 0x2, {0xffffffffffffffff, 0x2, 0x8000, 0x2, 0x10001}}) 22:57:29 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "fc7057afccdf9aadc8ae1f2c47ad26a4"}, 0x11, 0x2) ioctl$BLKRAGET(r0, 0x1263, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x3b2) [ 3039.208110] kernel msg: ebtables bug: please report to author: bad policy [ 3039.243939] kernel msg: ebtables bug: please report to author: bad policy 22:57:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3039.271123] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:29 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x209}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3039.346863] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:29 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8000, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000040)={0x100000000, 0x3, 0xef, &(0x7f0000000140)="3b4c7b954c1f88d550d678e3a5d23611f36339324f5ce085478c5b1a544d836ae0bbc544a3d86db375bde5820e2dd24ec3d8884c665e0faa466b4bd9887aa9178f1a5c0fb0f487e378c00890aec62f70ff1a8711262d5a71fd44424cc8e821c03c9fbc4565cd152577fc093928cddf31927e5efd6d87bcf0857c6b56f419b4d9837cea4fde8ab7ab66cd73f65512747c4c18bccde7041f8cac5c8eb1f1982c44e9a2bed4f674020e1297f81bb9f05c1d0ade77d8cfdfc2252e131468817a90ed7a94e0d06f6eb2e1a3a623b6373b34a56b39f771678e8e209616d51f389d9af0cdabe430181aee665749f54bebc4e7"}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000280)={r1, &(0x7f0000000240)=""/40}) r2 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x1000040000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000000c0)) accept4$vsock_stream(r2, &(0x7f0000000300)={0x28, 0x0, 0x0, @my=0x1}, 0x10, 0x800) 22:57:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3039.470177] usb usb9: usbfs: process 7380 (syz-executor3) did not claim interface 0 before use [ 3039.502225] usb usb9: usbfs: process 7383 (syz-executor5) did not claim interface 2 before use [ 3039.547015] kernel msg: ebtables bug: please report to author: bad policy [ 3039.553534] usb usb9: usbfs: process 7389 (syz-executor3) did not claim interface 0 before use [ 3039.576355] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3039.583317] kernel msg: ebtables bug: please report to author: bad policy 22:57:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3039.594983] usb usb9: usbfs: process 7383 (syz-executor5) did not claim interface 2 before use 22:57:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:29 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000000)=""/98) [ 3039.641614] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:29 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x20a}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000000, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xf, 0x1ff, 0x401, 0x80000, r1}) [ 3039.780189] usb usb9: usbfs: process 7413 (syz-executor3) did not claim interface 0 before use 22:57:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3039.838746] usb usb9: usbfs: process 7418 (syz-executor4) did not claim interface 2 before use [ 3039.866157] usb usb9: usbfs: process 7418 (syz-executor4) did not claim interface 2 before use [ 3039.911109] kernel msg: ebtables bug: please report to author: bad policy [ 3039.918694] usb usb9: usbfs: process 7421 (syz-executor5) did not claim interface 2 before use [ 3039.940515] kernel msg: ebtables bug: please report to author: bad policy 22:57:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:30 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000040)={0x81, 0x6, 0x8, 0x0, 0x5}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e20, @rand_addr=0x356}, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)='bcsh0\x00', 0x5, 0x31a8, 0x1}) 22:57:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfffffffffffffffd, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3039.964455] usb usb9: usbfs: process 7426 (syz-executor3) did not claim interface 0 before use [ 3039.972626] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3039.987319] usb usb9: usbfs: process 7434 (syz-executor5) did not claim interface 2 before use 22:57:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:30 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x20b}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3040.152563] usb usb9: usbfs: process 7442 (syz-executor4) did not claim interface 2 before use [ 3040.176085] usb usb9: usbfs: process 7442 (syz-executor4) did not claim interface 2 before use [ 3040.211047] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:30 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x5, 0x70b, 0x5, 0xfff, 0x1, 0x1000, 0xfffffffffffffff7, 0xfffffffffffff001, 0x4, 0xfff, 0x0, 0x200}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000000)=0x4, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x20, 0x10}, &(0x7f00000001c0)=0xc) 22:57:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3040.265413] usb usb9: usbfs: process 7453 (syz-executor3) did not claim interface 0 before use [ 3040.289079] kernel msg: ebtables bug: please report to author: bad policy 22:57:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3040.333631] kernel msg: ebtables bug: please report to author: bad policy [ 3040.365504] usb usb9: usbfs: process 7459 (syz-executor5) did not claim interface 2 before use 22:57:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3040.474583] usb usb9: usbfs: process 7465 (syz-executor5) did not claim interface 2 before use [ 3040.491233] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3040.503183] usb usb9: usbfs: process 7474 (syz-executor4) did not claim interface 2 before use 22:57:30 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x20c}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3040.542774] kernel msg: ebtables bug: please report to author: bad policy [ 3040.571495] usb usb9: usbfs: process 7480 (syz-executor3) did not claim interface 0 before use 22:57:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x10) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/118, &(0x7f00000001c0)=0x4b) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000200)={{0x8b71, 0x4}, 'port0\x00', 0x0, 0x4, 0x5, 0xfffffffffffffffc, 0xaea, 0x5, 0x9, 0x0, 0x6, 0x8}) ioctl$BLKRAGET(r2, 0x1263, 0x0) [ 3040.587536] kernel msg: ebtables bug: please report to author: bad policy 22:57:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:30 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7fffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0x800000000000a1, 0x2, 0x7, 0x0, 0x1f}) 22:57:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3040.750619] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3040.830036] usb usb9: usbfs: process 7499 (syz-executor4) did not claim interface 2 before use [ 3040.862250] IPVS: length: 75 != 8 [ 3040.868040] usb usb9: usbfs: process 7504 (syz-executor4) did not claim interface 2 before use [ 3040.878719] kernel msg: ebtables bug: please report to author: bad policy [ 3040.901682] usb usb9: usbfs: process 7503 (syz-executor5) did not claim interface 2 before use 22:57:31 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) sendmsg$nl_generic(r0, &(0x7f00000011c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x240000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x106c, 0x33, 0x10, 0x70bd28, 0x25dfdbfe, {0x7}, [@generic="796e7a23caeb113d1a69fbec58538de8b510ee82ac4da31656e08ada3a714d75e197", @nested={0x1034, 0x83, [@generic="a1410c6a749ea11e6ac11ba1055cdb86ee0e44bda5f368142448bcb871f7a89d1e691d9c04a2929bfbe3f984b67b8f", @generic="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"]}]}, 0x106c}, 0x1, 0x0, 0x0, 0x24008081}, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x3) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000001200)={@empty, @remote}, &(0x7f0000001240)=0xc) 22:57:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x2000000000003, 0x4) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000080)=@get={0x1, &(0x7f0000000000)=""/95, 0x7}) ioctl$sock_netdev_private(r0, 0x89fa, &(0x7f0000000140)="a33e467f4b8935d8cd18525e53357bd6ca903c7e90babdd812b258a607969eb7bf1333c87d18a595d3d7099fba3a51e9bf3d60fa6fe5dc2eea782834dda663bc77a2660b0c4f115f193ae2c126a03e00f7bb70ba0dbd6379edb02007d00c20de6f2bfb2e4ae0fddf4540000fa4d42ec75cbc2f9aa7b675b5fc60c598de42ce4ba695595362b733b82889f3ca1fb8003bc30112662521d98ada5e806e5496451067321f17eb75d0002da0d74068cb75d0359ac414e77f3ef565ae362159004c09579f3167a34e5433544e22217d22bc8d136fcb3f71af9a5bee88f8dc5be660c1f89c56292bc7c739b542ebaf990a49285e") ioctl$BLKRAGET(r1, 0x1263, 0x0) clock_getres(0x7, &(0x7f00000000c0)) 22:57:31 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x20d}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3040.934923] usb usb9: usbfs: process 7505 (syz-executor3) did not claim interface 0 before use [ 3040.989750] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3041.125047] usb usb9: usbfs: process 7520 (syz-executor4) did not claim interface 2 before use [ 3041.150209] kernel msg: ebtables bug: please report to author: bad policy 22:57:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000000)) [ 3041.185212] usb usb9: usbfs: process 7520 (syz-executor4) did not claim interface 2 before use [ 3041.287155] usb usb9: usbfs: process 7545 (syz-executor3) did not claim interface 0 before use 22:57:31 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000080)={0x20080000000000, 0x8, 0x6, 0x1}) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x9) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000240)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x2, 0x8, 0x5}) connect$rose(r0, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x5, [@bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) [ 3041.338006] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:31 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x20e}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3041.396099] kernel msg: ebtables bug: please report to author: bad policy [ 3041.448706] usb usb9: usbfs: process 7557 (syz-executor5) did not claim interface 2 before use 22:57:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x40000) 22:57:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3041.538046] usb usb9: usbfs: process 7565 (syz-executor4) did not claim interface 2 before use [ 3041.593186] usb usb9: usbfs: process 7565 (syz-executor4) did not claim interface 2 before use [ 3041.615190] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3041.642252] usb usb9: usbfs: process 7569 (syz-executor3) did not claim interface 0 before use 22:57:31 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x5) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0xa1, 0x2, 0xfffffffffffffffb, 0xfffffffffffffffe}) socketpair(0xd, 0x80b, 0x7, &(0x7f0000000080)) set_mempolicy(0x0, &(0x7f0000000000)=0x2, 0x20) [ 3041.699034] kernel msg: ebtables bug: please report to author: bad policy 22:57:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3041.807009] usb usb9: usbfs: process 7587 (syz-executor5) did not claim interface 2 before use 22:57:32 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x20f}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:32 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) mq_timedsend(r0, &(0x7f0000000140)="1c64a9ed63014e83ec378af28a77b8eb9b53783b3da746793418d840838df7b0f7ee6a6c39c72bbba133e2a8099388767f72e397bc5e1d63b633ee10b4fdd45b72b8af673b48f5c1cef30096cc9b158a5285315b6a1fb982d039ed5a9feb5e7227926d9458a3f52ee3b22577f14d8848c4024e8dd3aaab6bd5e336ddde74953ef241d903bc12d8f6e0bb0208e5f99004bde39cd5ed8d27f655267814ed4f9fd80b3ab4e16b72e40afa75f9d343431fd7d42da89c7b97562de76be36934a00acb145f144d1401669ae6ac123fd9346de5eb13e4895447661483e7634326fd", 0xde, 0x9, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000080)={0xa1, 0x2, 0x0, 0x74}) ioctl$BLKRAGET(r2, 0x1263, 0x0) [ 3041.882343] usb usb9: usbfs: process 7593 (syz-executor4) did not claim interface 2 before use [ 3041.891447] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3041.927522] usb usb9: usbfs: process 7593 (syz-executor4) did not claim interface 2 before use [ 3041.958137] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3041.977604] usb usb9: usbfs: process 7599 (syz-executor3) did not claim interface 0 before use [ 3042.008561] kernel msg: ebtables bug: please report to author: bad policy 22:57:32 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3042.120266] usb usb9: usbfs: process 7614 (syz-executor5) did not claim interface 2 before use 22:57:32 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x210}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3042.210565] usb usb9: usbfs: process 7619 (syz-executor4) did not claim interface 2 before use [ 3042.232505] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3042.251896] usb usb9: usbfs: process 7626 (syz-executor4) did not claim interface 2 before use 22:57:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fanotify_init(0x78, 0x1000) ioctl(r0, 0x7ff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) fstat(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) accept4$ax25(r2, &(0x7f0000000600)={{}, [@default, @netrom, @remote, @default, @null, @rose, @remote, @bcast]}, &(0x7f0000000680)=0x48, 0x80000) prctl$PR_MCE_KILL_GET(0x22) getgroups(0x5, &(0x7f00000001c0)=[0xffffffffffffffff, 0x0, 0xee01, 0x0, 0xee01]) fsetxattr$security_smack_transmute(r2, &(0x7f0000000380)='security.SMACK64TRANSMUTE\x00', &(0x7f00000003c0)='TRUE', 0x4, 0x3) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000400), 0x4) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB='fd>', @ANYRESOCT=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030313730817961f5757365725f69643d", @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRES64, @ANYBLOB=',allow_other,default_permissions,allow_other,blksize=0x0000000000000e00,default_permissions,blksize=0x0000000000000200,permit_directio,fscontext=user_u,fsuuid=72969wwf-a0w3-204c-8658-5v4c76;0,smackfsdef=/dev/bus/usb/00#/00#\x00,dont_appraise,\x00']) syz_open_dev$swradio(&(0x7f0000000480)='/dev/swradio#\x00', 0x1, 0x2) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40010080}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x90, r5, 0xb739be0ac64065a4, 0x400000070bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x3ff, @ipv4={[], [], @rand_addr=0x4}, 0x3f}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1f, @mcast1, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}]}, 0xfffffffffffffedb}, 0x1, 0x0, 0x0, 0x100004000000}, 0x4000000) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r6, r3, r4}, 0xc) ioctl$BLKRAGET(r2, 0x1263, 0x0) [ 3042.293734] usb usb9: usbfs: process 7622 (syz-executor5) did not claim interface 2 before use [ 3042.328607] kernel msg: ebtables bug: please report to author: bad policy 22:57:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:32 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0xd9, 0x1, 0x100000001}) 22:57:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3042.468349] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3042.504948] usb usb9: usbfs: process 7648 (syz-executor3) did not claim interface 0 before use 22:57:32 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x211}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3042.526074] usb usb9: usbfs: process 7651 (syz-executor5) did not claim interface 2 before use [ 3042.543412] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3042.586311] usb usb9: usbfs: process 7651 (syz-executor5) did not claim interface 2 before use 22:57:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:32 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl(r0, 0x10000, &(0x7f0000000140)="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") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3042.654014] kernel msg: ebtables bug: please report to author: bad policy 22:57:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) connect$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x2}}, 0x10) ioctl(r0, 0x623, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000340)={0x53, 0xffffffffffffffff, 0xfd, 0x4, @buffer={0x0, 0x6d, &(0x7f0000000040)=""/109}, &(0x7f0000000140)="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", &(0x7f0000000240)=""/159, 0x8, 0x2, 0x0, &(0x7f0000000300)}) ioctl$BLKRAGET(r2, 0x1263, 0x0) [ 3042.823444] usb usb9: usbfs: process 7676 (syz-executor4) did not claim interface 2 before use [ 3042.857061] usb usb9: usbfs: process 7675 (syz-executor3) did not claim interface 0 before use 22:57:33 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x212}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3042.898239] usb usb9: usbfs: process 7683 (syz-executor4) did not claim interface 2 before use [ 3042.926645] kernel msg: ebtables bug: please report to author: bad policy 22:57:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3042.959763] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3042.985364] usb usb9: usbfs: process 7689 (syz-executor5) did not claim interface 2 before use 22:57:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:33 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x6, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) 22:57:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3043.037119] usb usb9: usbfs: process 7697 (syz-executor5) did not claim interface 2 before use 22:57:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) ioctl$BLKRAGET(r0, 0x1263, 0x0) 22:57:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3043.207078] usb usb9: usbfs: process 7712 (syz-executor4) did not claim interface 2 before use [ 3043.215464] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:33 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x213}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3043.275949] kernel msg: ebtables bug: please report to author: bad policy [ 3043.282916] usb usb9: usbfs: process 7717 (syz-executor5) did not claim interface 2 before use [ 3043.330189] usb usb9: usbfs: process 7720 (syz-executor4) did not claim interface 2 before use 22:57:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000080)={0xe, 0x2, 0x7fff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r3 = inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x40000210) inotify_rm_watch(r2, r3) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$BLKRAGET(r2, 0x1263, 0x0) set_mempolicy(0x3, &(0x7f0000000180)=0x16, 0x80) 22:57:33 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40001000001, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3043.379470] usb usb9: usbfs: process 7723 (syz-executor5) did not claim interface 2 before use [ 3043.526698] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:33 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x214}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3043.579104] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3043.591790] usb usb9: usbfs: process 7741 (syz-executor3) did not claim interface 0 before use 22:57:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:33 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000340)=[{0xc, 0x0, 0x7}], 0xc}}], 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) [ 3043.626235] usb usb9: usbfs: process 7746 (syz-executor5) did not claim interface 2 before use [ 3043.660814] kernel msg: ebtables bug: please report to author: bad policy 22:57:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3043.739501] usb usb9: usbfs: process 7755 (syz-executor5) did not claim interface 2 before use 22:57:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:33 executing program 4: 22:57:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)={0x5, 0x8001, 0xffffffff, 0x7e45}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3043.897193] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3043.906246] usb usb9: usbfs: process 7771 (syz-executor3) did not claim interface 0 before use [ 3043.964546] kernel msg: ebtables bug: please report to author: bad policy [ 3043.975793] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:34 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x215}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:34 executing program 4: 22:57:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3044.031791] usb usb9: usbfs: process 7784 (syz-executor5) did not claim interface 2 before use 22:57:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="482abe21c54db23ae3f239a83c9ba6a3de96a14eeb1574e492542e1f62170eaf2cc48dfc42fca1084503a4257db21c7a90c4cfe81fa5aa1ab3cba451c8dbc7948faff1e508228b3e5fa3471de709887cb8a98f87ae230a2b4e9335c1450d2f83a53f762b854063", 0x67, 0x20040005, &(0x7f0000000140)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000000)=0x7f, 0x4) [ 3044.135331] usb usb9: usbfs: process 7784 (syz-executor5) did not claim interface 2 before use 22:57:34 executing program 4: [ 3044.217954] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3044.293088] usb usb9: usbfs: process 7802 (syz-executor3) did not claim interface 0 before use [ 3044.318447] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3044.351336] usb usb9: usbfs: process 7807 (syz-executor5) did not claim interface 2 before use [ 3044.383013] usb usb9: usbfs: process 7813 (syz-executor5) did not claim interface 2 before use 22:57:34 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x216}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:34 executing program 4: 22:57:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000040)) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1535160d9263cfa6, 0x4) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:34 executing program 4: [ 3044.792103] usb usb9: usbfs: process 7825 (syz-executor5) did not claim interface 2 before use 22:57:35 executing program 4: [ 3044.895962] usb usb9: usbfs: process 7830 (syz-executor5) did not claim interface 2 before use 22:57:35 executing program 4: ioctl$SIOCX25SENDCALLACCPT(0xffffffffffffffff, 0x89e9) gettid() syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="59cc9effffe1164f1c10fcad86dd6005f5260008000000f40000000000000000000000000000ff02000000000000000000000000000100000000000890"], 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x802102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) 22:57:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) connect$vsock_dgram(r1, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) 22:57:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f00000000c0)='7', 0x1) 22:57:36 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x217}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3046.244044] IPVS: ftp: loaded support on port[0] = 21 22:57:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x6404) setsockopt$inet_dccp_int(r1, 0x21, 0x0, &(0x7f00000000c0)=0x1f, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x4) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000040)=0x5, 0x4) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000140)={0x5, &(0x7f0000000080)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000180)={r3, 0x3}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:36 executing program 4: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x4bccaf89cb74913b, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0), 0x0, 0x6}}, 0x20) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000240)={@reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080), 0x10) flock(0xffffffffffffffff, 0x1) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x8000000000000b0, 0x900000000000000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[@ANYBLOB="00000900000000000000000000000000d900000000000000005d"], 0x1a) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x5385, &(0x7f0000000200)) r5 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x6, 0x8000) write$P9_RXATTRCREATE(r5, &(0x7f00000002c0)={0x7, 0x21, 0x2}, 0x7) syz_open_dev$admmidi(0x0, 0xcb, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000340)={r2}) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'bridge_slave_0\x00', 0x4}, 0x18) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000040)) 22:57:36 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x218}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3046.557562] device bridge_slave_1 left promiscuous mode [ 3046.563186] bridge0: port 2(bridge_slave_1) entered disabled state 22:57:36 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x219}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) timer_create(0x5, &(0x7f00000001c0)={0x0, 0xf, 0x1, @thr={&(0x7f0000000140)="345b65e30fd0db42649344a21d66de3dbc6fde6e13b594c0b5afcd93744cb46e6859ff4a2cca3f6abf1436735e18e27bbb91459ee232f517549b8d3e4789252279996fdf34d43ff9c9a8894636d3ef49aa49e39f876eead9c5ca", &(0x7f0000000080)="277f1b"}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000280)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x2) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) getsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$BLKRAGET(r2, 0x1263, 0x0) [ 3046.610652] usb usb9: usbfs: process 7876 (syz-executor5) did not claim interface 2 before use [ 3046.629357] device bridge_slave_0 left promiscuous mode [ 3046.639683] bridge0: port 1(bridge_slave_0) entered disabled state [ 3046.710537] usb usb9: usbfs: process 7887 (syz-executor5) did not claim interface 2 before use [ 3046.743821] usb usb9: usbfs: process 7892 (syz-executor5) did not claim interface 2 before use 22:57:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3046.853357] usb usb9: usbfs: process 7896 (syz-executor5) did not claim interface 2 before use [ 3046.907754] device hsr_slave_1 left promiscuous mode [ 3046.932275] device hsr_slave_0 left promiscuous mode [ 3046.978747] team0 (unregistering): Port device team_slave_1 removed [ 3046.991564] team0 (unregistering): Port device team_slave_0 removed [ 3047.006793] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3047.070022] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3047.163112] bond0 (unregistering): Released all slaves [ 3047.282453] IPVS: ftp: loaded support on port[0] = 21 [ 3047.291064] IPVS: ftp: loaded support on port[0] = 21 [ 3047.347965] chnl_net:caif_netlink_parms(): no params data found [ 3047.529566] bridge0: port 1(bridge_slave_0) entered blocking state [ 3047.536097] bridge0: port 1(bridge_slave_0) entered disabled state [ 3047.543218] device bridge_slave_0 entered promiscuous mode [ 3047.552179] bridge0: port 2(bridge_slave_1) entered blocking state [ 3047.558775] bridge0: port 2(bridge_slave_1) entered disabled state [ 3047.566404] device bridge_slave_1 entered promiscuous mode [ 3047.685986] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3047.716942] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3047.768263] chnl_net:caif_netlink_parms(): no params data found [ 3047.787668] chnl_net:caif_netlink_parms(): no params data found [ 3047.807299] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3047.824575] team0: Port device team_slave_0 added [ 3047.874311] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3047.881787] team0: Port device team_slave_1 added [ 3047.908466] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3047.930266] bridge0: port 1(bridge_slave_0) entered blocking state [ 3047.937099] bridge0: port 1(bridge_slave_0) entered disabled state [ 3047.944739] device bridge_slave_0 entered promiscuous mode [ 3047.953729] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3047.968313] bridge0: port 1(bridge_slave_0) entered blocking state [ 3047.974982] bridge0: port 1(bridge_slave_0) entered disabled state [ 3047.982527] device bridge_slave_0 entered promiscuous mode [ 3047.990170] bridge0: port 2(bridge_slave_1) entered blocking state [ 3047.996763] bridge0: port 2(bridge_slave_1) entered disabled state [ 3048.004246] device bridge_slave_1 entered promiscuous mode [ 3048.014405] bridge0: port 2(bridge_slave_1) entered blocking state [ 3048.020756] bridge0: port 2(bridge_slave_1) entered disabled state [ 3048.028375] device bridge_slave_1 entered promiscuous mode [ 3048.117560] device hsr_slave_0 entered promiscuous mode [ 3048.154575] device hsr_slave_1 entered promiscuous mode [ 3048.207146] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3048.231447] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3048.240648] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3048.256301] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3048.266863] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3048.300445] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3048.322245] bridge0: port 2(bridge_slave_1) entered blocking state [ 3048.328658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3048.335333] bridge0: port 1(bridge_slave_0) entered blocking state [ 3048.341694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3048.362798] bridge0: port 1(bridge_slave_0) entered disabled state [ 3048.373330] bridge0: port 2(bridge_slave_1) entered disabled state [ 3048.401190] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3048.408741] team0: Port device team_slave_0 added [ 3048.431072] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3048.439365] team0: Port device team_slave_1 added [ 3048.455463] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3048.463047] team0: Port device team_slave_0 added [ 3048.469893] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3048.484668] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3048.492551] team0: Port device team_slave_1 added [ 3048.507533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3048.516193] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3048.528373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3048.541979] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3048.554026] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3048.637499] device hsr_slave_0 entered promiscuous mode [ 3048.714572] device hsr_slave_1 entered promiscuous mode [ 3048.765116] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3048.772561] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3048.837745] device hsr_slave_0 entered promiscuous mode [ 3048.884812] device hsr_slave_1 entered promiscuous mode [ 3048.925078] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3048.932465] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3048.941244] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3048.952059] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3048.958216] 8021q: adding VLAN 0 to HW filter on device team0 [ 3048.970646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3048.977822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3048.989184] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3049.010124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3049.035093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3049.042772] bridge0: port 1(bridge_slave_0) entered blocking state [ 3049.049182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3049.059224] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3049.072448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3049.080383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3049.087975] bridge0: port 2(bridge_slave_1) entered blocking state [ 3049.094388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3049.108107] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3049.121841] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3049.138920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3049.149471] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3049.158859] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3049.175375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3049.201243] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3049.213870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3049.235062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3049.256844] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3049.272225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3049.279556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3049.287952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3049.299391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3049.314985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3049.322683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3049.343848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3049.358075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3049.366444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3049.387761] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3049.393828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3049.418692] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3049.431116] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3049.451270] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3049.475445] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3049.486351] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3049.495606] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3049.505958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3049.513044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3049.522790] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3049.533865] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3049.540627] 8021q: adding VLAN 0 to HW filter on device team0 [ 3049.566100] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3049.606823] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3049.612906] 8021q: adding VLAN 0 to HW filter on device team0 [ 3049.629189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3049.637039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3049.647253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 22:57:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)) r2 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000240)=0xc) sendmsg$netlink(r0, &(0x7f0000001700)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000016c0)=[{&(0x7f0000001840)={0xdc, 0x3b, 0x1, 0x70bd27, 0x25dfdbfb, "", [@nested={0x0, 0x6a, [@generic="fd34b668cc5000ffb7b67f467104b0487c49cb77727c7e4cc062ea8f962988e2198643e937faf5b6b4c56325dc925cbf217f75ed9cbd3a729763414795356b459a095b90e25b02f82548d5af963854c7d974c9275c9d227724ddd1703d0f70118436a29107263d1ab04df2b71984acd6cc8269a1f204133a4c2662a5201c0e6907a0042f879803af59275b521e70f7b8b593eafbed65174dad6fc048b8e1c44f98b5be59febbd0bfb5948a4ec7e16e1076d124724851cfed91464ac73de2525c3454bdf3b08fff6851a3166f6cead3850f2017ed8e883ef8b335d5cffb79c483", @typed={0x0, 0x42, @uid=r2}, @generic="f202e6a61a48bb278cafa0b15a816e042419bea18a6396fc0a8c43f3c629271f1c3ec1f1004f9b4a19469f", @generic="a3f0b0313dca8936179c0b9a0c7c726a2b286c3572892f7346c995ac76f33e45", @generic="b02c6cca1d74c8b58b303f4454faa1de753b44ecebd2ff2cc964ea08c4be2c755ec7e85f6e19feecd14d02522143baa3ecd0831bafad9b0d6c16138644984ff1a5425b6be53acdd026a1660cfd272ec785365d6c", @generic="345a749f7fdd8582e80a27ea6b825db85b0cdf72ddd80b6f23f1c9ad1df35f7232780bb9df92ada0efe88e634ccf43cc7c3be808618ad1b2b19651f732ff60486d6440d12c90da4e7f3c356bbccb", @generic="cbd11d06b4a0922ee3eeef569d92d015652441b1dc1bfc4dc3c3cb42dfe0153b7f1b744026e47acb1eb58c03600b805b896f814da1e38af0a0f25feb062a8c006d3cda746045310540b413692182c541b9e1df0799d4b548c02493e2532e7f02a1127ad9662dc07d8ffebb75cb979ef57bf3626024512e5746418c45eca3887e733b689a514107f7edd14367ab2e7be87b67768a353bc9fe8c24cb79d16472ff3348a86f466517c4df41ff96dd7d9d0e17bbd6d2529830895868925f655e8f23e4f0", @generic="b6fa4c1066c50ce3a63a89cb4aefe3ee5d4112b5f9efeb37a3ad64e9919065b65f300a90db9276871c692e225b0416cb9171b7e01deafbe25888a3c083b1c9e4466d397a299a82"]}]}, 0xdc}, {&(0x7f0000001b40)={0x86, 0x3a, 0x2, 0x70bd2d, 0x25dfdbfe}, 0x10}], 0x2, 0x0, 0x0, 0x8800}, 0x4000800) 22:57:39 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x21a}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3049.660717] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3049.660957] kernel msg: ebtables bug: please report to author: bad policy [ 3049.669860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3049.683505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3049.692133] bridge0: port 1(bridge_slave_0) entered blocking state [ 3049.698591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3049.734741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3049.746374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3049.754086] bridge0: port 1(bridge_slave_0) entered blocking state [ 3049.760544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3049.776556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3049.785561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3049.796787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3049.805640] usb usb9: usbfs: process 7915 (syz-executor5) did not claim interface 2 before use [ 3049.818118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3049.826464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3049.837003] usb usb9: usbfs: process 7920 (syz-executor5) did not claim interface 2 before use [ 3049.846386] bridge0: port 2(bridge_slave_1) entered blocking state [ 3049.852776] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3049.861861] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3049.870746] kernel msg: ebtables bug: please report to author: bad policy [ 3049.902105] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3049.921162] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3049.978289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3049.990221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3049.999238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3050.007511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3050.015891] bridge0: port 2(bridge_slave_1) entered blocking state [ 3050.022223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3050.032671] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3050.051208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3050.062900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3050.071405] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3050.081902] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3050.090999] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3050.099204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3050.107498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3050.115747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3050.126685] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3050.150038] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3050.161203] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3050.173447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3050.181785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3050.189686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3050.197873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3050.205549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3050.219740] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3050.239987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3050.249434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3050.260130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3050.269159] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3050.277452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3050.285893] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3050.294730] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3050.300794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3050.312531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3050.325613] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3050.333016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3050.341317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3050.349602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3050.357628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3050.391155] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3050.400888] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3050.413539] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3050.460278] 8021q: adding VLAN 0 to HW filter on device batadv0 22:57:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:40 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="29d0280bdb2f3e8c64869c37beb7e3fddd7e60cece27e03c205d939c0ae1605bf012af8cf8f203c502"], 0x1, 0x0, 0x0) [ 3050.519042] usb usb9: usbfs: process 7934 (syz-executor3) did not claim interface 0 before use [ 3050.551210] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3050.599443] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='personality\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000480)=""/4096, 0x101b}], 0x1, 0x0) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x401, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xfff}) ppoll(&(0x7f0000000040)=[{r3, 0x100}, {r0, 0x2014}, {r3, 0x8}, {r1, 0x408}, {r0, 0x22}], 0x5, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x7fffffff}, 0x8) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:40 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x21b}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:40 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f00000004c0)={0x2, 0x4e20, @empty}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1}}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000077000/0x3000)=nil, 0x3000, 0x1000000}, &(0x7f0000000100)=0x10) [ 3050.645273] usb usb9: usbfs: process 7947 (syz-executor3) did not claim interface 0 before use [ 3050.660236] usb usb9: usbfs: process 7950 (syz-executor3) did not claim interface 0 before use [ 3050.765973] device bridge_slave_1 left promiscuous mode [ 3050.772813] bridge0: port 2(bridge_slave_1) entered disabled state [ 3050.801078] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 3050.808304] vhci_hcd: default hub control req: ff0f v0000 i0000 l0 22:57:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x10) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/118, &(0x7f00000001c0)=0x4b) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000200)={{0x8b71, 0x4}, 'port0\x00', 0x0, 0x4, 0x5, 0xfffffffffffffffc, 0xaea, 0x5, 0x9, 0x0, 0x6, 0x8}) ioctl$BLKRAGET(r2, 0x1263, 0x0) 22:57:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) eventfd(0x7) ioctl(r0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x406, 0x0) ioctl$BLKRAGET(r1, 0x1263, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x101, 0x100000001, 0x9}) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000040)={0xe, 0x21, 0x9, 0x3, 0xb, 0x9dd, 0x1, 0xc1, 0xffffffffffffffff}) [ 3050.865889] device bridge_slave_0 left promiscuous mode [ 3050.871640] bridge0: port 1(bridge_slave_0) entered disabled state [ 3050.872362] kernel msg: ebtables bug: please report to author: bad policy [ 3050.885477] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3050.902163] usb usb9: usbfs: process 7975 (syz-executor3) did not claim interface 0 before use [ 3050.949451] device bridge_slave_1 left promiscuous mode [ 3050.982632] bridge0: port 2(bridge_slave_1) entered disabled state [ 3050.995440] IPVS: length: 75 != 8 22:57:41 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x100000000, 0x0, 0x2, 0x2, 0x3, [{0x8, 0x1, 0xb8b, 0x0, 0x0, 0x102}, {0x100000000, 0x7fff, 0x0, 0x0, 0x0, 0x108}, {0x5, 0x7a8, 0x96, 0x0, 0x0, 0x4}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000140)=0x1, 0x4) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000002c0)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000300)=r2) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000000000)={0xcf8, "3a70894139ede77493428f5bc12dfaae19666c5d749f08b0918b6025d6050be5", 0x2, 0x40, 0x5, 0x200000, 0x100, 0x4}) [ 3051.005778] usb usb9: usbfs: process 7980 (syz-executor4) did not claim interface 2 before use [ 3051.045719] device bridge_slave_0 left promiscuous mode 22:57:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0xcd}, 0x4) [ 3051.051508] bridge0: port 1(bridge_slave_0) entered disabled state [ 3051.064915] usb usb9: usbfs: process 7983 (syz-executor5) did not claim interface 2 before use [ 3051.088834] usb usb9: usbfs: process 7987 (syz-executor5) did not claim interface 2 before use 22:57:41 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) r2 = getgid() write$FUSE_ATTR(r0, &(0x7f0000000240)={0x78, 0x0, 0x7, {0x1, 0x400, 0x0, {0x2, 0x5, 0x7fffffff, 0x6, 0x6, 0x1, 0xe6c, 0x1, 0x5, 0x10001, 0x5, r1, r2, 0x2e8d, 0x8}}}, 0x78) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r3, 0x1263, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f00000002c0)={{0x456c, 0x5, 0xffffffffffff6184, 0x10001}, 'syz0\x00', 0x30}) [ 3051.112010] usb usb9: usbfs: process 7989 (syz-executor4) did not claim interface 2 before use [ 3051.244706] usb usb9: usbfs: process 7994 (syz-executor5) did not claim interface 2 before use [ 3051.272188] usb usb9: usbfs: process 7999 (syz-executor5) did not claim interface 2 before use [ 3051.297609] usb usb9: usbfs: process 7997 (syz-executor4) did not claim interface 2 before use 22:57:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3051.433901] usb usb9: usbfs: process 8004 (syz-executor5) did not claim interface 2 before use [ 3051.448790] usb usb9: usbfs: process 8006 (syz-executor5) did not claim interface 2 before use [ 3051.498538] device hsr_slave_1 left promiscuous mode [ 3051.562903] device hsr_slave_0 left promiscuous mode [ 3051.622891] team0 (unregistering): Port device team_slave_1 removed [ 3051.637501] team0 (unregistering): Port device team_slave_0 removed [ 3051.650764] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3051.702597] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3051.812920] bond0 (unregistering): Released all slaves [ 3051.976988] device hsr_slave_1 left promiscuous mode [ 3052.018529] device hsr_slave_0 left promiscuous mode [ 3052.058827] team0 (unregistering): Port device team_slave_1 removed [ 3052.076920] team0 (unregistering): Port device team_slave_0 removed [ 3052.089848] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3052.140922] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3052.247915] bond0 (unregistering): Released all slaves 22:57:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:42 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) r2 = getgid() write$FUSE_ATTR(r0, &(0x7f0000000240)={0x78, 0x0, 0x7, {0x1, 0x400, 0x0, {0x2, 0x5, 0x7fffffff, 0x6, 0x6, 0x1, 0xe6c, 0x1, 0x5, 0x10001, 0x5, r1, r2, 0x2e8d, 0x8}}}, 0x78) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r3, 0x1263, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f00000002c0)={{0x456c, 0x5, 0xffffffffffff6184, 0x10001}, 'syz0\x00', 0x30}) 22:57:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xef, 0xa0200) sendmsg$nfc_llcp(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x27, 0x0, 0x2, 0x7, 0x3, 0x1697, "b8f749de2ff019f9f540d454a09cd825ed22f40f8d0c74b5123dda17070167ce0893c298912b17ce1c0d17beb2686f895adebc16e1397c23d4cf63df962227", 0xb}, 0x60, &(0x7f0000000080)=[{&(0x7f00000001c0)="50cbce9e57d5d51cd72f3f69eb6865f4282dc478de890122d779a78ca3f4a0d185d0ddba9bb7bf054e2e0f30f3f017a3a6ed7281fc2a480ce811c81ef4debb7c236a8dcb2a79a35b4cd228af1013494fb5fecf520c2cdb40cd3607be70a2c737a55a97595627226efed989f8e95cbb6055a9ba0af2e5676c49c9", 0x7a}], 0x1, &(0x7f0000000240)={0x70, 0x18f, 0x0, "e37300f42b7696f515295770419916b46f5f15bc10fe8facb69259f2061071bc8b27ddf5730d95a3d0a0ce2181140620c03720b0f5f17574d57d475cc316d1767efce982ad43184054bcebfc8a45df3fae3db48d5b272050247e9201f6022c"}, 0x70, 0x804}, 0x40000) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) 22:57:42 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x21c}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3052.401935] usb usb9: usbfs: process 8012 (syz-executor4) did not claim interface 2 before use [ 3052.445224] kernel msg: ebtables bug: please report to author: bad policy [ 3052.469654] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:42 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) r2 = getgid() write$FUSE_ATTR(r0, &(0x7f0000000240)={0x78, 0x0, 0x7, {0x1, 0x400, 0x0, {0x2, 0x5, 0x7fffffff, 0x6, 0x6, 0x1, 0xe6c, 0x1, 0x5, 0x10001, 0x5, r1, r2, 0x2e8d, 0x8}}}, 0x78) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r3, 0x1263, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f00000002c0)={{0x456c, 0x5, 0xffffffffffff6184, 0x10001}, 'syz0\x00', 0x30}) [ 3052.489255] usb usb9: usbfs: process 8017 (syz-executor5) did not claim interface 2 before use [ 3052.506023] kernel msg: ebtables bug: please report to author: bad policy [ 3052.519373] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3052.535290] usb usb9: usbfs: process 8049 (syz-executor3) did not claim interface 0 before use 22:57:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3052.579153] usb usb9: usbfs: process 8017 (syz-executor5) did not claim interface 2 before use 22:57:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3052.622517] usb usb9: usbfs: process 8059 (syz-executor4) did not claim interface 2 before use 22:57:42 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x21d}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:42 executing program 5: r0 = socket(0x5, 0x5, 0x9d4) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) 22:57:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3052.701838] kernel msg: ebtables bug: please report to author: bad policy [ 3052.713817] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3052.723936] kernel msg: ebtables bug: please report to author: bad policy [ 3052.786194] usb usb9: usbfs: process 8076 (syz-executor3) did not claim interface 0 before use 22:57:43 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20\x00', 0x200400, 0x0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="736068273e07d82a26125e21813276eb97addae14612a0c84c3380b0c5d075ddf50758d31640eb5a65862370971f0888b9a43ec4a5630625f42aca9e91baa4b11a", 0x41, 0xfffffffffffffff9) r2 = request_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='\x00', 0xfffffffffffffffb) keyctl$link(0x8, r1, r2) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={r3, 0x5}, &(0x7f0000000440)=0x8) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000380), 0x4) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r4, 0x7fffffff}, 0x8) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000180)={0x7, 0x2, 0xb83, 0x2, 0x1}) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) [ 3052.850694] usb usb9: usbfs: process 8084 (syz-executor3) did not claim interface 0 before use [ 3052.892042] kernel msg: ebtables bug: please report to author: bad policy 22:57:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3052.935393] usb usb9: usbfs: process 8091 (syz-executor5) did not claim interface 2 before use [ 3052.947806] kernel msg: ebtables bug: please report to author: bad policy [ 3052.953073] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:43 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x21e}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3052.980436] usb usb9: usbfs: process 8100 (syz-executor4) did not claim interface 2 before use [ 3053.029681] usb usb9: usbfs: process 8103 (syz-executor5) did not claim interface 2 before use 22:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80, 0x8000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0xfffffffffffffffb, 0x2, 0x7e, 'queue1\x00', 0x793}) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) 22:57:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x71, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x7fffffff, 0x80080) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x5, 0x40000) [ 3053.089251] usb usb9: usbfs: process 8107 (syz-executor3) did not claim interface 0 before use [ 3053.115956] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3053.162447] usb usb9: usbfs: process 8117 (syz-executor3) did not claim interface 0 before use [ 3053.168889] kernel msg: ebtables bug: please report to author: bad policy [ 3053.185711] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3053.196039] kernel msg: ebtables bug: please report to author: bad policy 22:57:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3053.237178] usb usb9: usbfs: process 8129 (syz-executor5) did not claim interface 2 before use 22:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x600, 0x30) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000040)={0x1, {0x0, 0x1c9c380}, 0x101, 0x7f}) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read$eventfd(r1, &(0x7f0000000080), 0x8) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) 22:57:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3053.353970] usb usb9: usbfs: process 8137 (syz-executor3) did not claim interface 0 before use 22:57:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3053.434561] kernel msg: ebtables bug: please report to author: bad policy 22:57:43 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x21f}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3053.499756] kernel msg: ebtables bug: please report to author: bad policy [ 3053.539791] usb usb9: usbfs: process 8150 (syz-executor5) did not claim interface 2 before use 22:57:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3053.559316] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3053.625423] usb usb9: usbfs: process 8155 (syz-executor3) did not claim interface 0 before use [ 3053.645584] usb usb9: usbfs: process 8150 (syz-executor5) did not claim interface 2 before use [ 3053.671310] kernel msg: ebtables bug: please report to author: bad policy [ 3053.691218] usb usb9: usbfs: process 8169 (syz-executor3) did not claim interface 0 before use [ 3053.706166] kernel msg: ebtables bug: please report to author: bad policy [ 3053.715024] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3053.743987] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfffffffffffffffd, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x5, 0x81, 0xff, 0x7, 0x7}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x5, 0x8202, 0xffffffff, 0x6, 0x100, 0x0, 0x7f, r2}, &(0x7f0000000200)=0x20) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000080)={0x0, @local, 0x4e21, 0x4, 'rr\x00', 0x1, 0x5, 0x5}, 0x2c) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000000)={0x6, 0x0, 0x201d, 0x76, 0x3c, 0x6, 0x2, 0x1}) ioctl$BLKRAGET(r1, 0x1263, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x8, @loopback, 0xb45}, 0x1c) 22:57:44 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x220}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3053.872012] usb usb9: usbfs: process 8184 (syz-executor4) did not claim interface 2 before use [ 3053.900133] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3053.912452] kernel msg: ebtables bug: please report to author: bad policy 22:57:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3053.940119] usb usb9: usbfs: process 8197 (syz-executor3) did not claim interface 0 before use 22:57:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3054.015205] usb usb9: usbfs: process 8204 (syz-executor5) did not claim interface 2 before use [ 3054.037179] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:44 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x17f}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3054.069047] kernel msg: ebtables bug: please report to author: bad policy 22:57:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x0, r2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3054.153795] kernel msg: ebtables bug: please report to author: bad policy 22:57:44 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x221}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3054.194464] usb usb9: usbfs: process 8220 (syz-executor3) did not claim interface 0 before use [ 3054.244985] usb usb9: usbfs: process 8227 (syz-executor5) did not claim interface 2 before use [ 3054.275795] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3054.301172] usb usb9: usbfs: process 8235 (syz-executor3) did not claim interface 0 before use [ 3054.324833] usb usb9: usbfs: process 8241 (syz-executor5) did not claim interface 2 before use [ 3054.331394] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x4800000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) writev(r1, &(0x7f0000003580)=[{&(0x7f0000000000)="23f444dbf86b9da3cba0ead5993d1ad0aaee23a0b995f15843471fae73a84e4fc756257c48e086a34514e6c8c9aedb086494fa262cf844e35e807a164d8c543ede0c1cde1c9ba4bc6ff2c5f91c90d4d271ee2f0d525883530b4bed945da8095a99c4f14f63674f998adf711390a4d8278dc8bb546ed3ac2d20ce86326473d5a392ba7e38ec44df137ec7950b5ec44743f02e01ae9f846b6888a300d124d76db9d2859d0ae9ca1da747663d79a3fa987d48e2d8b6032ff05f", 0xb8}, {&(0x7f0000000140)="14682f296a5afc7bcdcda214a47735543fd992fd272008a831e7148e67786298b44d54bc9616e79f766fac8051d77480d3b6a3b237db414c5fef05ca8720371bb7349b91054eb5ab8260e1c2408cc5db4ba60d9422ee2eb61085115360ce556e096bb1f953f50f8993678aba6bf7baf68ac1af55142d9e9db055f0e41e38bd91ec09e66076a257b99a1b0ee0124a84e1efdfb2a31ca77838517401f7a2e00de6a87c93e39cd3a2a9eb75b2b36eb65a6aed28a27e7a18a8c407543b64fec693b164a3621b95271bce653a6ebf2cb30ba57d918c288a50303d03283a55bc1c67e595347aa3db80f771e8756767d95fa8f31337aed06389a0d4fd39c21ddc6966056cddf60b1adcd93adaedb253d662429dbca9b705f8eb09a3e06d32e327ab276cf835f8049927d8a4ffc433baee4c6945915cf3bdf841b4550b2056a8dfef819ff9cfe91333573ac5488344346763f4f111eb413509118caa1af7b2bbfdccec87fe149d7d9336255a4f56d6b6e01799b0c0f8e0835144d87b73303e8bd3d7afd44ce2466cff045481cd4df7b5dd9488b2325dd7cd3d8bdfa52a0d389fd9f3faf8f864786bc710ec5331bc11a4c343cbe280e596648e8af7436280660bf7b6d608de9577f146d03e250ce8dbdfa912ac5c7b127e6b7f2a2142fa5d7f511eac2d21f209e6ca06976c0f599ecdf7c4aee1610225084c14c9af04c441f8ba73254d3c51bc410969277aef3764885ba7bcda799510b61d99e2982da9ae99df74a4e97501307e5a98b3694190254c4561ef4132cbbc7c3bf4c8298743832f9b42924c3b6a68c9ad907edebf3fd53dfdf0462cfa43f467665b152ff1c87873a3f2e3c508594014ab8f058d5977bc0b573233212c609011c49e9bde574264e43e2f42af4dfe15b4779a39e44feb1fb18f624857828aef947e484050b370d2187ed615b040e7ceeedc1cf23761060ccf782c9fce459f05f99b59f5c7fdd94210717318b1d44e32dfea599d148aaaec3bd203b1ac60c98deb8c1fe46dee7afdcdf91766a399656172f50dd7e3bc5d093e919ca28e1d00a5ad03727fcfbe835a966fd7d29589dd9509a520b7739a7977f56671cd903a65f33bbb2212eb824473c987213b6d3e1cf82c4b45b4b1fd68186ec5927f4a66068e5809abc9f06c6aca7a0862c9d5d667465f58bbeb3912fcabeb09fbea85607218392c373052dcf801f31966564b98d839ff814334500ade7acb4906358082b111460c9799a96dc7a99f3203599f19615895abec7640de1b751ed38b988841a9f1d3adb94f8ff06f41c8907ee3e751517302c8d582059937b50780e2ca07c12b2903f8eda89c5159b9c7cd441826cc593c838dd17f501653b0f9f1880cc972cc2fb6302e311887bae8780fa9b285f94310faea9073653a3c72b2aa8e9f19d5f73c2fb080ed7c0ec995a81884969b8681791074145fd3007a95ff59b2a2b4166f73f9972f17fad51bdf82ec1c47d56ed0dde5818b6038f86a20527299ce97e9519b63ac7567f6ab5be76a8d72bfa03c70ed585fa017d8490b37c13fb7432ad7fc709373226beffd53f4655f2e4927d71db321a354b2208a41815c9bd541d0e1a98e579864db62fab9785a40eef0aa82b22f6cdebf00db399314ef0122448c6bd6de94897315fe84614b116065d7d4f2aa739f632b970ecec6ac3fb8d7abde2b45b9da5dde0574ce11ab58f963a7d2610240d593fe7a02140d6410fa006645865d6b002128b0d6927a38ee28333859c88781a65069138003a76b78da57013510e8d78f422ae126d60d55f189c03fe001a3e6194ca2b74f831a990dd4b752dc3a8c7a15696adb5dac438b067272637703484e5d533543a2a4c256b2859dc9a89ffcbb690465f94fb2f5371a6ad93d67fd4ac4907183592354b59978062f01dda1e11ef0cbde70d55ba4a1a798124ccd076d0615b42a95056874485bd72cbf838cca586f44b63f3465fd0a087ed64380ecd9d6da9d4d15d8ca12273dedbf3957b1100b3917a7b06d45030e1d52caf71bf4b135375075ad27fa2f4d540d4beb38460ae3a0d6947d7406cfb9c5a60f2244b665443b1d922e0f5349ddf45e2ee42a8372484c6c2ca7e8cabdad971354a080a6def216ec98698ef208990c79c1bc7a03b95a2e5f9ff903ef456ffcf6be3f528683eb9f64c5307b5d8b14d5d353c7010b2aa7de07f53e08a83ce26652eddd1f36761007e7e8baf1b05c3c7c8f7e3bd54332fe7e8c844ecb5d8d3b665b3823c3ecb0f6a5fa77cb348b25a8e2a909f3135f3a7a74105e0068ede95db1fd9dcb875e1bf192042bb27050f0a4fb593bc7623c7b679d44cb246b2148f735781f022d546ab0d9fba4ee389f85507ca14c6e2cd1883d82500444c134b17cb4b0ad6075c79e686ad92e7ffa787dc44ed495f5cf176445a959bb64ab7bef95ac835673c355fa2c87f488b507b6882b559be7df03ee45bcdd9ff8f429c8cba41de34ed966dcb3de260c6d07e17cdeadafb958e10c5685737c8a0296eef03e1afa715195ae247759be59f7adc7ca9c8428d3a29c6a97405d497d6a3aff8c08e40e397b2529034bff3add81f752160c4ddc66b932647da177323097bf4d6ce94b65b0c8d8035dc4d84fe8a0055172c80515bd5c6d33abc43f39d0dc9ea242e01631a3e8eaf4b64553c616c8ad838386f7326950790513d9305bfddf885eb4dbf7166dbdb2caab8bd9bad3886ec92e77fa7cd242c8a2290fd4b43ff5f3a12dd79fbb56dfb46c779518ae05aa289876cd2a83e4b18a0157e58f34494904db9e1a245d602163fd3c1e79f9d4efc1cd20c44a6cd942da008ead6a703d34bc1a05c190a92cde67ccddc4205a2ab5d1be3cf00991dd1ca68a76e7ecf5cebcda4de48afbff7ab173d5bd8bbcc3f13729911e3d9327455d89dcb908172f53d76cb49683622a37f6e653cfdc7b7adbac798d486afd433d1da5a99b4b986b67846ac110c4a460300739d9436fb764ca9a26b25505f5c5276c43dbbdb8f338eee2a4f597e2c5fcd4fcaef4b69763a3ff0157fc2e57b6e9846be9f51e5e235abb55d155c065ec4a20476faf7c24e11744b8d139bbf1578795a993f6fca90a663f2154cb5769dd56b5f505b45220b5ce2c0b297ec6d5b948c549f213a6f10a280c05131582d47f2820af39e91c4978935ffbba54cb42157e992784a078a3bcbec5f95ae21617f9c38cdb702e6a3e8765142b6c5ca0563e32f69a0b39541a46705e6e760570b9a5b93e3d926d29df52c6244eb753caa9d8d0956f808b390335157e56e3a480b3ea167db920ded7e58f0cb708df223cc2d9fd1116f9d4998cba1b73cfd64258ed88e1921684825d7a72a5d86e66e6a0be735db811138f5fb6ec4266618816f06fff6716bd1a675316764c2f9ca96e911b0a999e7167463514e0e10e3900e4051265ef64aa94ed411d9901dcb3a8e7620d41530353abec51f35612af04053d22075607506dadf1bbd5f8f3074573c7935c7f9bb22228b178915986aacaad6b5fdc075d31af3da958fab820f1ba89969b7a06e9789ab54cc24da47673e85a6f30c359833b4bf12f2b525d8f4633c2895a1194cb05547e9a3d3ef2c65a08cd9a333f119411aa0783cf6cc84c1b8607edd29b3c896bc83ee953b8149b102929556eef0738f1f96cbca9b2fc090540240368cb20c35958b9ae8c4156cd417422e5e3cd6c05dc79e2d799b9e6e5d1448d1233617e65fe38a1fb6a4a6f4162b3bc4a709bbeed0f2ce6d11b1b79dd798ff2a654839745c4a09ad3706b46ca249c503ff2f445418f85c43723b08fbb8e88c6494e0355a30d0a532f39da8900854775b8ac066d725b3d2cef5c095720acd5b65b4317cc7e7393496aa9ae0ee7d5ab3a0aa9595854986117df48dc35588702c6dcc215c58bc81ba55b077c557375c21049fb88c42630e74a3171a365e92e44211560874aee2ccf42eed935b99db09bfe19f3386749c10b08d0baf30d1ed284869370ed88d6dd04bead74d995d5512e9c89c152c35d39a4b15b33cc4c7497cb7df598836da05f7599e5606570c2025f223b1a618eac9fc98623ed13a66bf9add1c33c21ff629fe8b336f1df2a45544749feccd81bbca291a5cbdabc10948f190786f4496c535d8fb720d45031f8345c34735a3e9a15fee57e71b90077fed203be8d02cbf15758895a5dc3decc028a65cb1f36d6e5e8ba928cb0a9ab80626feb2d1577206426846ecc8ca5484bbe8234eca7cb437ee33b8efb9c8120fb3d837e19cc25b4f2f7c5ffa84cf428be439288e6ccef28052a365c08e679a07d32261da973563ddbc879dcd49b25c7b514ed3382441db78f9a5cd9c0fdc3d129c0e22462927672d31a6ceabc80621479b8e980f0e66f774ab9861aad17a72cfa8690dbc53803c83b3bf7eff174a9d842c05cf13aadb8f207a9ec51a5c537bef4b7f5c5e97c4caf2d94001d64c462dfda0173c64704034db5110da76b83a3b92b45cc5b351c9908628685e17bf984ef5820bdb86f7576fb815e4dc94b60d2d15a363858609d3f7a02f46db7940ab30fceb973f5e8a25a6ed0ced13a60f316aac39d471878fe81b53ce3205b8df6fa19ece3152b369eb1350d73526b40e7a71f26c54e74db402a62884383d5616b08c8ea1fdad4be0cc06bf5827c8936cbfd83e44dcb58d134cf45cb13348a8c41c102a003799bd6567ac4b03605a6cb31a57de762eaa38fc65be935032da64469abd1b9fe6b1d2e0ceccec66c7b83ca055d986d00bab05cb2fc350312d52b76b493fda07048a024c0c0c8ef6c23422062180ec170057e079a3503e133792e3f7efbf15ba552f4dfdcb4b4f8eea009ee1fb770feac85fa59b8f18b249315cb54e05c388f7d7468e4f66f5c659c2b373daec5d163efec3bad08f9e49ce1d4e6aeabc543945c965a937afece27a1bef3db811e597ac76644b824c45ad170b7857151d341ef17e5901644d79c71de75c62768b30bae7bfc1cb12be71d896b03098b1538d9175a2282e8357fc577862902471a6c7fc6bc239862c0d7b2c24e0bd6e7faaaca866fb29678080bb42d85a5c03b36ed42650fefa6b14e76deeb35a5d2327079f03b6997d64a5a09dacc71912943c58aa60f3d7c85ea54c0dec58c6b24d0be2e1bdbff88a07c4bdb025f396fdd12f055112fc78ef2137bfe9c906948f7dd4629ce23aea487c22452c49d3e0d392b035024b13ec9b486554f88ce65d95c8950333028e72c75e0c92f3c45aaaec2e2fc0c57bf1f5839a0e8bfab975d8b1cace6860791c0e126e866fb008e883279abe669bafb892280d7e0292c6228bf22b73e61f95bed8dae48bb727a6cde172208150bff86bc721aadb04c3923f7bff0bfab570b2c6b346c922827697bd6344f6a5ee692104fb2821f27b081b9e53ebd0dfa293a3939b20b3bbd2fa88194886ccafea46d67cd872a95f9bd47984de132b73550da257b3a2645628384523ea0e5bada8f9fb589de721775bd911e5047f3954b8d74c6e9113b91abbfb6614215a2f0cd421268a7585ad54b90a71594c3fc1fd3f3f515a86365488d3fafd29610132882c311300d52334d1e0e88c7cbe451a3d7d409221c5bf7c0722316f44ae9a361e6e9a131e2988928ddfe324f1ad5257776f9adc707bf7dfa61b0ae17ba9fac7ec4f54777963ee9c11e69dc3407b671f7a6d7c55f4d7e015c8c94221a0231ae416fae5fa5e1e7e7663a47970d81aa6c02644d9b7cfb2457111c0cb2d54f2ffd9e847cbbfb18a6e2758b0cc34a4fbde3fa30a17aefa7aa46fd1ef5d82377d81a3f2b54", 0x1000}, {&(0x7f0000001140)="7d6a30ff1800183819fabe9d3f94844c5e9e6e6c962f260d13089a6a41fe562298ec512d7f0def56472cfaf2b4a7f9d70cc6a8963b351847528f0d01cb5431e98274fc695d82046d18fd9c9a97c8811a3ed163e000be2dba54fe320d165805044f14b3be6c2ae478684284a273ff7bc7e49d8e56f8dbf959f528172e7ee4469fa2454b8151e9a2606eb9619002c5a1ba8314d504df5e6cbef8e715cc882874", 0x9f}, {&(0x7f0000001200)="f8f9fd411760b27df2a89218f61c1d010d13e3071b4141e27448ca890329020456ac156387f35fbaff759fd647d256c8b096778c42bb448d680fbb0dbbd535c53fd0c8a40f616bdbe3258c0d7bdd3e8f48708b9a4b7dc869ca64ea9c0411278226274a5800e2999058a024af918f4ec626a37984df305a210fca9cc650f7670c4ebba6ba27e5fdd3b3f2766d6a8a8f2a147896fbe423a5b28ae185c4f6ac5a2bee5918f41a57055f89373c048de3f5be312b12df168dd9e3fb4107ff960845d4ca2028980b0eec0c3482e73bd3402b94763742", 0xd3}, {&(0x7f0000001300)="5e221d144229885a3afc134ce8172b414c8a73a5a344ce58da34f00b37b22cb8025f87a3a26a6cfa14586066abf4f230ba18bb08c29dd1d7ba426038a8d0d72774db00b6bac32648506b1f1c9baad30092e5b94952eda65f20c3777ac209ae7097c1a1e816d1b9df5c7fa5aec9c6a718e0bb0362bc83147b532f26ef7ee05faf0deaa0d8", 0x84}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f00000023c0)="a819e04b83082b44739fd1d2ccd398b28b8a842c6cfb3ea63b7a1e02f7c5b5fa9ee6424ec4ef7cd7492adc908880e9680af080f3a51ef873fbfe8e705108102af4747edf8f46fc2a44e6765ef7dc7eabf2cbae9834d29b20916a8e5a6099c0e4a5a413c2d73acf393a8033e9e598ccce56eff057cab51bafac146d621e13edde13894bcba02aa1f2cc62372f35bbfe1723fbf569f44cd7aa84e9eccc95944551b40282d80fe4c0ed2686f841c59c2150cd65e393c9f18f17758c0592c61fab5e91f4a6928eb9d5d3901c7a2a631a217c478cf86ac00599380bf8b9317774c0a174147bc77d2714fce308f930bba17a8df8dc3afabeabd43d5352f08095c792c48605c28106ea1f41f6a678aa4a57035a678edc8afb064df380f6c52432d384df74c924e56cd20878839a8070a2fce82650876f760b7d6dca5ccae0e55689161146fbda64343ab600f0a1d278d386eee29bcde09c6b89dec4af9dd06bf9cd09c39e766cc7a3e2f2f393a176dafaf47a6c29ee1e6f25d9efef0b8cb0f79723dd031e1df3d7220753599d67f34716bda27af0b29d5619badc6e132b791b55d894860e3c62b149b85c9f4eb589408c8b0851242347f15721407e43be9106dc0d5c6df021c7c4654f9ebe3949ec3590a564db8932294e83a227722165030a04e2f6a76041f3e0df519d31c09878aeb1569081dcab6b67a596c5118c46965df9251b76359a749ee92c06d7db27fcd872c034469b0ea8a14383650b60f3d6e9fa9d6c129222f869e656abbad7167129c35fda8eadada10defcc0f29309032515022a0ed2594098a504b9d068be2cc05ceedc7e14cfb7cac20f8ccdf95d66fda00380b96fc7c1964a597cd516380709d3e9280954e23a2d8c3e1892d6eb1a46da0afee19536c3ce35fa2b03819e81d3977808ce7f49e1098f51a7a4f572bd8444f26e896ee6f912c9c16e42155898a71f7d3848751bdd59683e5d9ed0adc10eada4c6fadf638e61f2b265a7afe77a7769ea9dbb25ce179927980ff4ad3a7ac0b497e837864d4fec9782495f3d5589538c602f91aa355aae82db6fb221bad640d42f7a844835e847b4c6583ec9885885cfa1b75e8dc182e3e9078437c63e1bac3f81d1fc53a42a0365b1856f527db1e39041c19b39e8a8cb86e808fb7b29047e89e83014ea328751e3403c8f23129c1eef2cbaf98ca608fc7362589f0597c6362cd61b14ee60e7c82964039c2860e81b93103927324d806146af38b4d4728a5a270c371f45e72080fabcc5a0cc7ef21466a88d63ea1c2e34760cd6c0d02face73c28e92d2e3cf0344d3ac1b6bf029a4abca3d098463cf0bfdb57ada94be25f5843f019722febe85787975d86c8f81b70ade55b8999c15a80bf91b156607af6e3f9a7cadfacf50b99b99ccd99cb2c6eec2c8ebf9742a012a17845593a81f4e73ea115a8908570506f4a08a5649d8a5eef1994b49cd68cb4fdb9c8ce4c7ab298b65695688660aa3dc948d2e377dc550174a685df8a8f8639023d9828b775b2ae5231cfac479f5926b6c090cb250502a3ef93f2f05ddfa0e901ab5fa155439c787bb130d41e4333eff78f33dfc65185555d52201a74c5c8fb0bf05fb4b9ab55cf77b569d1624951d41ed6b16ad6264b85269024a511ea2ff7ff8dbbaf58a9dfa4072690a75fbd3aa4d3393fed3f7f0cf009c608a6fdecd5f7b243c9f8cb1416004a4e3d6d406007c33b19582cc3e142ec23316bf96e545a197485a02a2471e33ef57bacc6e0c06d8f807aeaa532f4e24e8e6bf2663a199e0e9afb6131c30c78a0a3ee9b082e8e4bc2dc72d6976e831a9c06abe95e1dbc52c9c8ad97a776126e88fc83d08f83f054feb7b02f607e23e539f2a0e4509e547833556148c790a24725b61c9ecd55c7df62d09486e7660cff063ab26151567cea07a9922052fcefdb53881f0e874883c7e89dc8038e6addac12481d688f61dfd627c8ff137b96047d2194df342c7e28efdc60cd85bf17375d396fb987051b4af22d6b06dface5ff2aba1f1ec0399f547171eb4fca3ad26b45fe8323d19a3405c627284591dee2d735331cefe11d956ed4ae21265766112bfc31a36a87649f9df06919ea420cf1367bad132f787b4f5574eb04214b40e6a363f7a59df900b0fcee92059d41ab8562a1c97aa7451f947719c24bd5cd27f0c5a6b35d57cf335e5b7f0b9e24208fd340e262dff6c55b8df994aa415ffb2e606e2ddf26e1df6a29454ad5be597185d0e91ad923aa6bb3fd936001fce23ed282cd01334234cc361005ea70db15edc1795af43db7406af1e6c6dd5951b23784f0773eba6d1cc39b5dd548c5a2669650092d765278dd85fef01c0daf60abe28b47fb05e1d82aaecebbf451f21a08f63d34c9e5af7b2f65ce947461b8ee0bd204a1e8a31a4e120f2e19404d732d3ae11f8e7ee3b1afb407efed67f5bdb66c155820783c82954cfa55e35e69e09e70eb010176fb73e71d3be9bdf1621f4fcb4518233ccb923d37d49a656f5d7468cfc0a3eac6476b2e364558cdeba1c1cb457a812a8262ab9f835e330c7a6edc1615ce883c16c5f1019ab50f93562eba14e650e461263d05a44bf023bfd803093fe17a2f9053ad235ac3a8b02a86d4db5098feb48ab33799352600a5dd8b920b0d6e23f1ef0b6db511ed4ceab45bd8b6f3b1bd4c4493f6fae990ae88ae398095f6e959bda75ef03b3e3d9c578bb2c40085d1c70473fe5779035d3e2453685f6300a963832d9f10bbfe76e804868b573286a0f05c4a33c02061dc80bc4b8e7c1b4b1e6ecee47d3c2b395ca947b1d138eb4b30c95bfd2a912bdf184379cfb39fbebcd9d7ab6c9d99c161c979687ed33acaae243ff2485eb05b3d6e125724a02ecd162f682b174df6eab10d7173eee6e138b422faa30f20b4ca9effc0796e8412ca076d146d586fc57f9b70a0e3a1d1189ff26d8befb43848695b88ff549d83cf489466f3422adcd340351cb73f7934c3172a8b3260c3045b42c153d459bd0918ea78a24474172c8cb2407a35951cf75dedd0ca8624b795cecb0cd1109b46335776eb1441909d36f6d6f1aefc2c8232e3d1e5f217ca2bd53e271d1d97c5acd6987259f76797fd9ec78b136f113bb7c37a5c553f8bf6403ec262f0caacf81a710c3248746269b73e618760dcce678318d7ddcd72a35f362327a937fce8072cfaa6eb41d180c279738d0a0955073395dd62f05aaf552fa6628f61ec0088256cd0c554c3a45174cc3e0e2b8aa33ca6cb96591cd8f8241a13ba68450cb02b8ab43c6a1e7395428911e2e2548ea6dfade15431c9361cb544d594e26acc85c684420bc1b700ed7e8d56bfac3f769772ad560f930f03d97f168ef67f007819a72caed6a92bd6fb2f1d271a6f797906ac92456edae43fe3236f0679d81c359ebd320f8bc374039f52c23b8d86c065c1e0b3f174ed7c6d3bf8a2c6ca3cab12e1c2bc04853c13c36011a81dc8f888fac5cdb24c81b1e91b48abe25b35380ca11414fec759ce77ba79217b01bdf3d4404da55153e327fff405c0b6fdae394b180f557ca103aedec717204abe366e65d6d45473b9e10b2cbd18e604b0d0ec805737896aabe53063a9ce2282bec72e8dd8d4151ea0b4035bf5c3f0aba89c5e7ff80b6f783547a1942b37b718875fe59191a607dd6bed27a55f3cf14fa3b31eb17cc220af617102eea30dc821e27f56442435fe45577cc66fdb40dfc6ec070ae99d98ee975d74dcb92e6c04866485d1201df98d9603800f5d5ed19e3e4debe50e6949700b165838d24154508bcecbf9638cd6725f13282bc5d18f8f06fa73f6e25955168e47b0bd71d3508e238f9a0a71c7da214be0c7ac669ef5c0e4bc690bb9dccf2f8acb656c2a8b5fccc31ed7e77886d6b931e61547af42409de910c088f0b560e8fb84bb5a130435965dedf4752afa142bd7af84e594c0dee14c1fec5d8b737e99f14a5263551414b0e3a3885bffff7863412e164185a335c472b1712a1f4885dc2f9fbcf65bc0682da7da1a13bf4cc672e2811d157f16ce86fd3bbef91d9e89ad34d802c86986d00f6ab330bd18168405b67cc4616d9df83d6e8461d14254bc6b6b162cc19a043cb5abf4fa32958cda4fba3da681a5a142862840dcdaede0397441d27d9e72f2915ab021204063a548e7516f58216eef06992610b126c5f9536ab46ad4df2ca3501cd5b6a6a37d79cc026c8ddabfb15b42671d19feaa828b7ef6c01289e37351ce12f80f1bd284b0895164e996499c1dbebec33ce6f42d173418c8cdb9994b4e9512d9769790eeb29614da607227b75f0cd85d282a9f981cccc0206ceba8b904e286ff05087548514130e672fc3b7eadb0070c18db84fd0404672a9afc9e0c0ed4a0c630a5556a6cfde72002c7acea51912f2b5613653bcea23313f63febec8637094533aa24dff1f2fd6715d32f85827ce4c04b9fb1144f9feea1abbd381b3bc07aec25a2efba1669db1c1f2978c75e04d86e38436a3a90ec427501df4aaced685b0d78266e6c83f806d02efa22edbfe3d10e633fe1bd35c5e858d27246c46ca7288ba577055b0bf798c2313144ba7d8316f8ecc190410668635fd15a93de2d5fd8dba2fb2eb87c19050a4021e74244fffc60e3e42a3bce309477cd22788af06e4a8d9f365a710399933be0e97f6acacdac1d4d6d79fa43c9145c8b2de3fb07dd3067f7329c67624e18a0f8094247aed5d7335810c2521770dc0c4bef26c6ce6a7315e400540bd3cd465d4fd29bd04cacbdb196c9a60acb45e97bdb6cdab11ff7ef0d1fdb3e5f4ffa89e2a8dbd4bcbb678319219125985e9be437b9792833aa33508848978fa08cb2d11cc7ed42db40f0333c6d5fc2383fe2996ac90575492f8bbca2784c02b70103ced392274e516b746596cc71340cf6312cded2f753a9cdbf5e943f204808314b8c651d33dfd4bc9a15bcfd76c95a176752beeef2cb58e7332f0bf32f671d1b4612910663004520a37819a87dd91ee1e05ae777eea4e9d3afb01d912457df74b591f3cfee81579189945b3eb60c43d46e4e0e10c01612cad7a362b3f0eaf3c64635a2374aef3f4d7efa4a6691b527d6690e2b3aeb8ca405c1ddd65f2a9582db78e5b5a2858b34758d3db00cd82d7b4fec860406d92dda756f76245937b858a0e02059ee031429cdf8451737bf635b1c102ae6de4184e9af32669821a6d976e98f726733f4f7d5f3a13f7963dd8493b4f3dd7c1955f941bfe1b673e1b2ca2f262712ac2275ffc6da4ea702b5dd77d1694427b5037e03d49874b99930e15135ffe3a842b1f28cd626b27f9a23e03497982ffd2812555f0b9537864b5fed30efc3f28371d867ca296dbf91575f5d59f7f96dcb2470410fedbd8bb0f04006ea6d06f8c089d19adc54ddb4ae235d72d19d956d0e646606a2fe0eba1539d24411084b7d207f3f557a83a5d1d090344431e15c29a6070cdb291c9f264a9d45854a3130eb735e5d222dd1940222b1ca796653b37fe0a2e81b107ba2b00accf657493104e32866fd8643e8a8117cc391d3220c21c53cbb87c20e2c06fe503c49d416c59924c112f0209933bf7675bea8f3f8f0f7b58bce565abbb64076c71379c7d95850fb512d5ea53645fe6da34d4d87cd95751f92fe090d270fbec95bc6ddf42cc7cbe326c090e83acf4c1b9deb2a6689afc1e42b51cbda362709873ac831b390c14a793cb51565309ffbd863e39b221570d26d6d4c875db0e9b51a6209a352145b0bc8315d5bcea27b5223127d718413d0ae33d793712544aa042c48ed43957b12e911c21b984", 0x1000}, {&(0x7f00000033c0)="8146702b09b9e286f9e2c0f71fabe51b6c4edc3bf9b615d377ecaac7a0d1049c0174fe30b1e943c218bc2eb4cf20c0171442fb3d62248eb094573b0916962b205371b4982f2ab2d9f42e1393703a90ec04b8430b47cc6e852676773f667015b9af138b6ddfefbed3ea75ffbfe8cc4aef58d4cc4e94e76d469ed7b3e53d19f31437e36c3fba7332944d70f68067c8fbba57491fc7505e06e75956971012d36e50803e09376415f38e7f6da051225c1d9f1b2b3cf8203ed633f444b5f56b3b039d848f0ae95b64745b527f5561b0eb6e081b25c55a665514b97e5098fb277249b385c2d27e72b237d9f238d34db5fa34af00bcc536ec2ba03b44", 0xf9}, {&(0x7f00000034c0)="60e0b6b5c83c67cdd783d1332d649e470f75170a71e6fc6eff18b621ae31004773c241c11582c3d2109936abb02933afd79eaddd581178ff9e58bab24e20594861956d9b62f677d36b7bfee4807a9e9b74457616c1a70fd8d93faf69acfc2109ea1974ee0a0dbb884f66e1311f87e644f1f839071e59e7e4c18303cc8a1f5ad2e2c6e58a1284f174e5f922a545a905349745d31f15e3b3d2b4", 0x99}], 0x9) [ 3054.474537] kernel msg: ebtables bug: please report to author: bad policy [ 3054.509535] usb usb9: usbfs: process 8260 (syz-executor4) did not claim interface 2 before use 22:57:44 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x222}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x4800000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3054.646753] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3054.655742] usb usb9: usbfs: process 8269 (syz-executor3) did not claim interface 0 before use [ 3054.669794] kernel msg: ebtables bug: please report to author: bad policy [ 3054.679588] usb usb9: usbfs: process 8278 (syz-executor5) did not claim interface 2 before use 22:57:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3054.701928] kernel msg: ebtables bug: please report to author: bad policy [ 3054.719261] usb usb9: usbfs: process 8294 (syz-executor3) did not claim interface 0 before use [ 3054.757359] usb usb9: usbfs: process 8295 (syz-executor5) did not claim interface 2 before use [ 3054.794369] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3054.808069] usb usb9: usbfs: process 8286 (syz-executor4) did not claim interface 2 before use 22:57:45 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x223}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3054.895929] kernel msg: ebtables bug: please report to author: bad policy 22:57:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3054.937477] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3054.941709] usb usb9: usbfs: process 8310 (syz-executor3) did not claim interface 0 before use 22:57:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0x0, 0x4800000000000000}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3054.977988] kernel msg: ebtables bug: please report to author: bad policy 22:57:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3055.136366] kernel msg: ebtables bug: please report to author: bad policy [ 3055.152444] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3055.153152] usb usb9: usbfs: process 8335 (syz-executor3) did not claim interface 0 before use 22:57:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) bind(r1, &(0x7f0000000040)=@rc={0x1f, {0x1, 0x4, 0x6d27, 0x6, 0x0, 0xe9}, 0x1}, 0x80) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x3, [0x0, 0x8, 0x6]}, 0xa) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3055.192033] kernel msg: ebtables bug: please report to author: bad policy [ 3055.199079] usb usb9: usbfs: process 8327 (syz-executor4) did not claim interface 2 before use [ 3055.219680] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:45 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x224}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:45 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x13a}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3055.328831] usb usb9: usbfs: process 8347 (syz-executor5) did not claim interface 2 before use [ 3055.340618] kernel msg: ebtables bug: please report to author: bad policy 22:57:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3055.395914] usb usb9: usbfs: process 8356 (syz-executor3) did not claim interface 0 before use [ 3055.467096] usb usb9: usbfs: process 8366 (syz-executor3) did not claim interface 0 before use [ 3055.472168] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:45 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x225}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3055.560398] kernel msg: ebtables bug: please report to author: bad policy 22:57:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x20, &(0x7f0000000000)=[@in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e24, @loopback}]}, &(0x7f0000000080)=0x10) getsockopt$inet_dccp_buf(r1, 0x21, 0x0, &(0x7f0000000200)=""/28, &(0x7f0000000240)=0x1c) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e22, 0x10000, @mcast2, 0x1}}}, 0x84) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3055.640671] kernel msg: ebtables bug: please report to author: bad policy [ 3055.653246] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:45 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2, 0x0, 0xa00000000000000}) [ 3055.758109] usb usb9: usbfs: process 8394 (syz-executor3) did not claim interface 0 before use [ 3055.780770] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3055.816393] kernel msg: ebtables bug: please report to author: bad policy [ 3055.837724] usb usb9: usbfs: process 8404 (syz-executor3) did not claim interface 0 before use 22:57:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:46 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x226}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3055.870471] kernel msg: ebtables bug: please report to author: bad policy [ 3055.885312] usb usb9: usbfs: process 8406 (syz-executor5) did not claim interface 2 before use 22:57:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3055.975854] usb usb9: usbfs: process 8421 (syz-executor3) did not claim interface 0 before use [ 3056.006920] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x95, 0x280000, 0x2013, 0xf, 0x9, 0x3, 0x2, 0x2}}) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) [ 3056.039087] usb usb9: usbfs: process 8429 (syz-executor3) did not claim interface 0 before use [ 3056.050093] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3056.057541] kernel msg: ebtables bug: please report to author: bad policy 22:57:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3056.131121] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3056.167610] kernel msg: ebtables bug: please report to author: bad policy 22:57:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3056.235144] usb usb9: usbfs: process 8451 (syz-executor5) did not claim interface 2 before use 22:57:46 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x227}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3056.300240] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3056.315409] kernel msg: ebtables bug: please report to author: bad policy 22:57:46 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000100)={0xa0, 0x100, 0x1f, 0x4, 0x90000000000000}) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000000)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) 22:57:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3056.361348] kernel msg: ebtables bug: please report to author: bad policy [ 3056.366446] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3056.381379] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3056.393882] usb usb9: usbfs: process 8461 (syz-executor3) did not claim interface 0 before use 22:57:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3056.471087] usb usb9: usbfs: process 8480 (syz-executor5) did not claim interface 2 before use [ 3056.508280] usb usb9: usbfs: process 8477 (syz-executor3) did not claim interface 0 before use 22:57:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3056.528525] kernel msg: ebtables bug: please report to author: bad policy [ 3056.547071] kernel msg: ebtables bug: please report to author: bad policy [ 3056.549276] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3056.572640] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl(r0, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x406, r1) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x301a00) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000040)={0x1, r4}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r5, 0x1263, 0x0) 22:57:46 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x228}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3056.696395] kernel msg: ebtables bug: please report to author: bad policy 22:57:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3056.738715] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3056.755328] usb usb9: usbfs: process 8509 (syz-executor3) did not claim interface 0 before use 22:57:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3056.821277] usb usb9: usbfs: process 8514 (syz-executor3) did not claim interface 0 before use [ 3056.859924] kernel msg: ebtables bug: please report to author: bad policy 22:57:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3056.871629] usb usb9: usbfs: process 8520 (syz-executor5) did not claim interface 2 before use 22:57:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3056.912147] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3056.949390] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 22:57:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:47 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x229}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3057.032387] usb usb9: usbfs: process 8535 (syz-executor3) did not claim interface 0 before use [ 3057.082815] kernel msg: ebtables bug: please report to author: bad policy [ 3057.090372] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x800, 0x1ff, 0x2, 0x1a31}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3057.126117] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3057.137169] usb usb9: usbfs: process 8551 (syz-executor3) did not claim interface 0 before use 22:57:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3057.195596] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 22:57:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3057.264674] vhci_hcd: invalid port number 255 [ 3057.281949] vhci_hcd: default hub control req: 0008 v0000 i00ff l0 22:57:47 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x22a}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3057.316056] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3057.351977] kernel msg: ebtables bug: please report to author: bad policy [ 3057.371732] vhci_hcd: invalid port number 255 [ 3057.379836] usb usb9: usbfs: process 8571 (syz-executor3) did not claim interface 0 before use [ 3057.381231] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3057.407254] vhci_hcd: default hub control req: 0008 v0000 i00ff l0 22:57:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3057.417087] kernel msg: ebtables bug: please report to author: bad policy [ 3057.432336] usb usb9: usbfs: process 8584 (syz-executor3) did not claim interface 0 before use 22:57:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3057.580298] kernel msg: ebtables bug: please report to author: bad policy [ 3057.614428] usb usb9: usbfs: process 8601 (syz-executor3) did not claim interface 0 before use 22:57:47 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x22b}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3057.656794] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3057.690049] usb usb9: usbfs: process 8611 (syz-executor3) did not claim interface 0 before use 22:57:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) [ 3057.746561] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3057.813744] kernel msg: ebtables bug: please report to author: bad policy [ 3057.848338] usb usb9: usbfs: process 8629 (syz-executor5) did not claim interface 2 before use 22:57:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x80020, 0x2, 0x0, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3057.910993] usb usb9: usbfs: process 8636 (syz-executor3) did not claim interface 0 before use 22:57:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x2}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3058.017584] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3058.053835] vhci_hcd: default hub control req: 2000 v0008 i0002 l0 22:57:48 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x22c}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0x9, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3058.093158] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3058.104521] kernel msg: ebtables bug: please report to author: bad policy 22:57:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3058.134479] usb usb9: usbfs: process 8658 (syz-executor3) did not claim interface 0 before use [ 3058.202880] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3058.221272] vhci_hcd: default hub control req: 0900 v0000 i0002 l0 [ 3058.228082] usb usb9: usbfs: process 8664 (syz-executor3) did not claim interface 0 before use 22:57:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3058.243691] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x3}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xda6e, 0x101000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x6c, r2, 0x310, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffff8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffffffffff7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0x6c}}, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r3, 0x1263, 0x0) r4 = gettid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r4) [ 3058.376252] kernel msg: ebtables bug: please report to author: bad policy 22:57:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3058.440887] usb usb9: usbfs: process 8687 (syz-executor3) did not claim interface 0 before use 22:57:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:48 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x22d}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3058.543667] usb usb9: usbfs: process 8694 (syz-executor3) did not claim interface 0 before use 22:57:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:48 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3058.715582] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 22:57:48 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:48 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x22e}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3058.777428] usb usb9: usbfs: process 8710 (syz-executor3) did not claim interface 0 before use 22:57:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x5}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3058.975300] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 22:57:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:49 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x22f}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3059.177905] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 22:57:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) read(r0, &(0x7f0000000000)=""/22, 0x16) ioctl$BLKRAGET(r1, 0x1263, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 22:57:50 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3060.135159] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 22:57:50 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:50 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x230}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:50 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x6}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3060.276337] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 22:57:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3060.385278] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 22:57:50 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x231}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3060.490011] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3060.519411] IPVS: ftp: loaded support on port[0] = 21 [ 3060.586449] IPVS: ftp: loaded support on port[0] = 21 22:57:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3060.620662] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3060.668113] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3060.736853] IPVS: ftp: loaded support on port[0] = 21 [ 3060.743584] IPVS: ftp: loaded support on port[0] = 21 [ 3061.034603] chnl_net:caif_netlink_parms(): no params data found [ 3061.167743] chnl_net:caif_netlink_parms(): no params data found [ 3061.221700] bridge0: port 1(bridge_slave_0) entered blocking state [ 3061.228181] bridge0: port 1(bridge_slave_0) entered disabled state [ 3061.235755] device bridge_slave_0 entered promiscuous mode [ 3061.256470] chnl_net:caif_netlink_parms(): no params data found [ 3061.283970] bridge0: port 2(bridge_slave_1) entered blocking state [ 3061.291929] bridge0: port 2(bridge_slave_1) entered disabled state [ 3061.299210] device bridge_slave_1 entered promiscuous mode [ 3061.314061] chnl_net:caif_netlink_parms(): no params data found [ 3061.406672] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3061.414404] bridge0: port 1(bridge_slave_0) entered blocking state [ 3061.421256] bridge0: port 1(bridge_slave_0) entered disabled state [ 3061.428412] device bridge_slave_0 entered promiscuous mode [ 3061.435657] bridge0: port 1(bridge_slave_0) entered blocking state [ 3061.442023] bridge0: port 1(bridge_slave_0) entered disabled state [ 3061.450844] device bridge_slave_0 entered promiscuous mode [ 3061.460782] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3061.468719] bridge0: port 2(bridge_slave_1) entered blocking state [ 3061.475355] bridge0: port 2(bridge_slave_1) entered disabled state [ 3061.482288] device bridge_slave_1 entered promiscuous mode [ 3061.497042] bridge0: port 2(bridge_slave_1) entered blocking state [ 3061.503410] bridge0: port 2(bridge_slave_1) entered disabled state [ 3061.511425] device bridge_slave_1 entered promiscuous mode [ 3061.586845] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3061.603026] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3061.618778] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3061.626551] team0: Port device team_slave_0 added [ 3061.638876] bridge0: port 1(bridge_slave_0) entered blocking state [ 3061.645858] bridge0: port 1(bridge_slave_0) entered disabled state [ 3061.652822] device bridge_slave_0 entered promiscuous mode [ 3061.662109] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3061.691029] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3061.699337] team0: Port device team_slave_1 added [ 3061.711600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3061.718958] bridge0: port 2(bridge_slave_1) entered blocking state [ 3061.725526] bridge0: port 2(bridge_slave_1) entered disabled state [ 3061.732893] device bridge_slave_1 entered promiscuous mode [ 3061.740855] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3061.749210] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3061.757047] team0: Port device team_slave_0 added [ 3061.762411] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3061.800906] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3061.808439] team0: Port device team_slave_1 added [ 3061.813830] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3061.837237] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3061.861930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3061.869623] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3061.877546] team0: Port device team_slave_0 added [ 3061.926158] device hsr_slave_0 entered promiscuous mode [ 3061.984630] device hsr_slave_1 entered promiscuous mode [ 3062.056191] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3062.064073] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3062.078515] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3062.086138] team0: Port device team_slave_1 added [ 3062.098672] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3062.146058] device hsr_slave_0 entered promiscuous mode [ 3062.184589] device hsr_slave_1 entered promiscuous mode [ 3062.242175] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3062.264659] device bridge_slave_1 left promiscuous mode [ 3062.270142] bridge0: port 2(bridge_slave_1) entered disabled state [ 3062.315336] device bridge_slave_0 left promiscuous mode [ 3062.320802] bridge0: port 1(bridge_slave_0) entered disabled state [ 3062.396292] device bridge_slave_1 left promiscuous mode [ 3062.401800] bridge0: port 2(bridge_slave_1) entered disabled state [ 3062.455046] device bridge_slave_0 left promiscuous mode [ 3062.460468] bridge0: port 1(bridge_slave_0) entered disabled state [ 3062.521029] device bridge_slave_1 left promiscuous mode [ 3062.526611] bridge0: port 2(bridge_slave_1) entered disabled state [ 3062.575393] device bridge_slave_0 left promiscuous mode [ 3062.580873] bridge0: port 1(bridge_slave_0) entered disabled state [ 3062.645572] device bridge_slave_1 left promiscuous mode [ 3062.651034] bridge0: port 2(bridge_slave_1) entered disabled state [ 3062.695588] device bridge_slave_0 left promiscuous mode [ 3062.701067] bridge0: port 1(bridge_slave_0) entered disabled state [ 3062.956646] device hsr_slave_1 left promiscuous mode [ 3063.011838] device hsr_slave_0 left promiscuous mode [ 3063.069514] team0 (unregistering): Port device team_slave_1 removed [ 3063.080780] team0 (unregistering): Port device team_slave_0 removed [ 3063.093100] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3063.139213] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3063.237295] bond0 (unregistering): Released all slaves [ 3063.436261] device hsr_slave_1 left promiscuous mode [ 3063.490014] device hsr_slave_0 left promiscuous mode [ 3063.549464] team0 (unregistering): Port device team_slave_1 removed [ 3063.560274] team0 (unregistering): Port device team_slave_0 removed [ 3063.571137] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3063.620567] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3063.705656] bond0 (unregistering): Released all slaves [ 3063.837594] device hsr_slave_1 left promiscuous mode [ 3063.878963] device hsr_slave_0 left promiscuous mode [ 3063.931787] team0 (unregistering): Port device team_slave_1 removed [ 3063.942898] team0 (unregistering): Port device team_slave_0 removed [ 3063.955627] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3063.990662] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3064.063200] bond0 (unregistering): Released all slaves [ 3064.236217] device hsr_slave_1 left promiscuous mode [ 3064.289744] device hsr_slave_0 left promiscuous mode [ 3064.332324] team0 (unregistering): Port device team_slave_1 removed [ 3064.343684] team0 (unregistering): Port device team_slave_0 removed [ 3064.356142] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3064.381932] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3064.479506] bond0 (unregistering): Released all slaves [ 3064.547044] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3064.554275] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3064.561693] team0: Port device team_slave_0 added [ 3064.567015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3064.574428] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3064.581792] team0: Port device team_slave_1 added [ 3064.590800] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3064.612625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3064.656135] device hsr_slave_0 entered promiscuous mode [ 3064.725556] device hsr_slave_1 entered promiscuous mode [ 3064.798141] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3064.804926] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3064.816765] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3064.828466] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3064.897685] device hsr_slave_0 entered promiscuous mode [ 3064.934555] device hsr_slave_1 entered promiscuous mode [ 3065.004007] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3065.015966] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3065.025469] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3065.037930] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3065.076195] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3065.108437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3065.152809] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3065.162942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3065.182587] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3065.191057] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3065.201970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3065.209681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3065.220638] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3065.230921] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3065.239878] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3065.246679] 8021q: adding VLAN 0 to HW filter on device team0 [ 3065.252822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3065.260372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3065.272365] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3065.282989] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3065.292215] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3065.298927] 8021q: adding VLAN 0 to HW filter on device team0 [ 3065.312121] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3065.325414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3065.332399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3065.343936] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3065.357359] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3065.367577] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3065.373643] 8021q: adding VLAN 0 to HW filter on device team0 [ 3065.380592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3065.388961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3065.397015] bridge0: port 1(bridge_slave_0) entered blocking state [ 3065.403347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3065.410522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3065.418552] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3065.426262] bridge0: port 1(bridge_slave_0) entered blocking state [ 3065.432593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3065.439831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3065.447045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3065.459351] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3065.468674] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3065.478278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3065.488540] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3065.498662] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3065.506619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3065.514921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3065.522536] bridge0: port 1(bridge_slave_0) entered blocking state [ 3065.528941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3065.535816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3065.543522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3065.551602] bridge0: port 2(bridge_slave_1) entered blocking state [ 3065.558009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3065.565085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3065.572824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3065.580472] bridge0: port 2(bridge_slave_1) entered blocking state [ 3065.586850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3065.593633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3065.602025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3065.613019] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3065.622168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3065.636499] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3065.645108] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3065.651280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3065.662964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3065.671028] bridge0: port 2(bridge_slave_1) entered blocking state [ 3065.677528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3065.684777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3065.692472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3065.701598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3065.708755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3065.718364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3065.728685] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3065.738421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3065.746807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3065.755135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3065.762881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3065.774989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3065.784065] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3065.793382] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3065.802234] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3065.809600] 8021q: adding VLAN 0 to HW filter on device team0 [ 3065.816266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3065.825021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3065.832508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3065.840441] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3065.848290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3065.856379] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3065.866400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3065.881007] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3065.891894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3065.900575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3065.909671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3065.917338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3065.925349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3065.932734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3065.940601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3065.948706] bridge0: port 1(bridge_slave_0) entered blocking state [ 3065.955113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3065.963646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3065.976468] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3065.986132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3065.995856] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3066.002650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3066.011103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3066.019152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3066.027012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3066.035282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3066.042838] bridge0: port 2(bridge_slave_1) entered blocking state [ 3066.049228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3066.056436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3066.063884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3066.071442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3066.079208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3066.088387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3066.100790] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3066.111730] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3066.119436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3066.127940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3066.136547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3066.146531] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3066.152576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3066.173458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3066.183988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3066.196915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3066.208026] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3066.215855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3066.225341] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3066.232879] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3066.242927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3066.254628] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3066.314759] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3066.321962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3066.329959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3066.337548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3066.345459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3066.358241] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3066.367577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3066.379211] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3066.450813] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3066.460884] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3066.468067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3066.478900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3066.486581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3066.494426] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3066.501992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3066.510212] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3066.521080] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3066.528554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3066.590499] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3066.617856] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3066.647095] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3066.654675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3066.682562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3066.705903] usb usb9: usbfs: process 8791 (syz-executor5) did not claim interface 2 before use [ 3066.706618] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3066.722793] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3066.737549] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3066.753890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3066.762698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3066.780646] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3066.793511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3066.838240] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3066.868379] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3066.940837] usb usb9: usbfs: process 8804 (syz-executor3) did not claim interface 0 before use [ 3067.102005] kernel msg: ebtables bug: please report to author: bad policy [ 3067.113788] kernel msg: ebtables bug: please report to author: bad policy 22:57:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x7, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e22, @local}}}, 0x108) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000000)={0x4, 0x5}) r2 = getpgrp(0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x2, 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) setpgid(r2, r3) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:57 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x232}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x7}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3067.497115] usb usb9: usbfs: process 8818 (syz-executor5) did not claim interface 2 before use [ 3067.575616] usb usb9: usbfs: process 8823 (syz-executor3) did not claim interface 0 before use [ 3067.625516] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3067.639009] kernel msg: ebtables bug: please report to author: bad policy [ 3067.654319] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3067.664845] usb usb9: usbfs: process 8836 (syz-executor3) did not claim interface 0 before use 22:57:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3067.682912] kernel msg: ebtables bug: please report to author: bad policy 22:57:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0xa}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3067.758773] usb usb9: usbfs: process 8842 (syz-executor5) did not claim interface 2 before use 22:57:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r2 = gettid() sched_getattr(r2, &(0x7f0000000000), 0x30, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:57:58 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x233}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3067.886929] kernel msg: ebtables bug: please report to author: bad policy [ 3067.893635] usb usb9: usbfs: process 8856 (syz-executor3) did not claim interface 0 before use [ 3067.900792] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3067.938378] kernel msg: ebtables bug: please report to author: bad policy [ 3067.945420] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3067.948985] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3068.022902] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3068.060845] kernel msg: ebtables bug: please report to author: bad policy 22:57:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x48}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3068.079177] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3068.081420] usb usb9: usbfs: process 8871 (syz-executor3) did not claim interface 0 before use [ 3068.098262] kernel msg: ebtables bug: please report to author: bad policy [ 3068.109656] usb usb9: usbfs: process 8889 (syz-executor5) did not claim interface 2 before use 22:57:58 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x234}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8225, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0x3, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000080)) 22:57:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3068.216251] usb usb9: usbfs: process 8893 (syz-executor3) did not claim interface 0 before use [ 3068.243670] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3068.264034] kernel msg: ebtables bug: please report to author: bad policy 22:57:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3068.308962] usb usb9: usbfs: process 8910 (syz-executor3) did not claim interface 0 before use [ 3068.358060] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3068.376866] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3068.390197] kernel msg: ebtables bug: please report to author: bad policy 22:57:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x4c}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3068.402695] usb usb9: usbfs: process 8919 (syz-executor5) did not claim interface 2 before use 22:57:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x200003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3068.495529] usb usb9: usbfs: process 8932 (syz-executor3) did not claim interface 0 before use 22:57:58 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x235}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3068.551718] kernel msg: ebtables bug: please report to author: bad policy 22:57:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x60}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3068.614101] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3068.617445] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3068.637963] kernel msg: ebtables bug: please report to author: bad policy 22:57:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3068.704581] usb usb9: usbfs: process 8944 (syz-executor5) did not claim interface 2 before use [ 3068.731037] usb usb9: usbfs: process 8959 (syz-executor3) did not claim interface 0 before use 22:57:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x68}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3068.764037] kernel msg: ebtables bug: please report to author: bad policy [ 3068.784756] usb usb9: usbfs: process 8967 (syz-executor3) did not claim interface 0 before use [ 3068.788328] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:59 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x236}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3068.887002] kernel msg: ebtables bug: please report to author: bad policy [ 3068.900402] usb usb9: usbfs: process 8961 (syz-executor5) did not claim interface 2 before use [ 3068.968391] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 [ 3068.986695] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x6, 0x970f95833031cbc5) r2 = dup(r0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2140, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000380)={r2, 0x5, 0x5, r3}) clone(0x4000400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x0) write$P9_RWSTAT(r4, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f00000003c0)=0x3) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) sendmsg$nl_crypto(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=@alg={0xf8, 0x10, 0x300, 0x70bd28, 0x25dfdbff, {{'ccm_base(xts(twofish),sha224-ssse3)\x00'}, [], [], 0x2400, 0x400}, [{0x8, 0x1, 0x8}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x8}]}, 0xf8}, 0x1, 0x0, 0x0, 0x20000800}, 0x40) ioctl$BLKRAGET(r4, 0x1263, 0x0) ioctl$VIDIOC_S_TUNER(r4, 0x4054561e, &(0x7f0000000040)={0x8000, "05f93cf1bfecb7c50d109fb78ba04314d29f18b32a9b8b84e94ad123d417e3e6", 0x2, 0x400, 0x4, 0x3, 0x1, 0x3, 0x8001, 0x6}) 22:57:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3069.012955] usb usb9: usbfs: process 8990 (syz-executor3) did not claim interface 0 before use 22:57:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x6c}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:57:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3069.095946] kernel msg: ebtables bug: please report to author: bad policy [ 3069.134246] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3069.147589] kernel msg: ebtables bug: please report to author: bad policy 22:57:59 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x237}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:57:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3069.193643] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #161 22:57:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="cb843855ecfad826641e2d1bcae4915bd0d11720000000000000000000000000000000"], 0xf, 0x1) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3069.266320] usb usb9: usbfs: process 9017 (syz-executor3) did not claim interface 0 before use [ 3069.285986] kernel msg: ebtables bug: please report to author: bad policy 22:57:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(0x0, 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x74}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3069.310978] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3069.360977] kernel msg: ebtables bug: please report to author: bad policy 22:57:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(0x0, 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3069.411312] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3069.429445] usb usb9: usbfs: process 9038 (syz-executor5) did not claim interface 2 before use 22:57:59 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000080)=0x5, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0xfffffffffffffffc, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) getpeername(r1, &(0x7f0000000180)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, &(0x7f0000000200)=0x80) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x800}}, 0x80, 0x200}, &(0x7f0000000300)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000340)={0x100000001, 0x8201, 0x9, 0x9, r4}, &(0x7f0000000380)=0x10) r5 = getpgrp(0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000003c0)=0x0) setpgid(r5, r6) syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0xca42, 0x100) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r3, 0x1263, 0x0) 22:57:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:59 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x238}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3069.496545] usb usb9: usbfs: process 9044 (syz-executor3) did not claim interface 0 before use [ 3069.502080] kernel msg: ebtables bug: please report to author: bad policy 22:57:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3069.553209] usb usb9: usbfs: process 9056 (syz-executor3) did not claim interface 0 before use 22:57:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x7a}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3069.600163] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:57:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(0x0, 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) 22:57:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:57:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3069.661364] kernel msg: ebtables bug: please report to author: bad policy [ 3069.683069] usb usb9: usbfs: process 9069 (syz-executor5) did not claim interface 2 before use [ 3069.734743] usb usb9: usbfs: process 9069 (syz-executor5) did not claim interface 2 before use 22:57:59 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x239}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3069.780332] usb usb9: usbfs: process 9075 (syz-executor3) did not claim interface 0 before use 22:57:59 executing program 5: socketpair(0x8, 0x4, 0xffffffffffff8000, &(0x7f0000000000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) [ 3069.831303] usb usb9: usbfs: process 9092 (syz-executor3) did not claim interface 0 before use 22:58:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3069.872849] kernel msg: ebtables bug: please report to author: bad policy 22:58:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x300}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3069.918873] kernel msg: ebtables bug: please report to author: bad policy [ 3069.937764] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3070.015026] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:00 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x23a}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3070.067305] usb usb9: usbfs: process 9108 (syz-executor5) did not claim interface 2 before use [ 3070.079225] kernel msg: ebtables bug: please report to author: bad policy 22:58:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000800a1040300080009000101bb0701000100d73cf72ed1f7d30cdebef4df9d53455f4874cb7b78503d7880bc7d8283a66fb7501558d55a7da72a0b188da3e5bff440a5d22b08d94eccaf65a1175c5cbc44c6bdca01ccf613469dd39192179e15000000000000000000000000"], &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={r2, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0xa7f9, @local, 0xd4}]}, &(0x7f0000000180)=0x10) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r1, 0x1263, 0x0) 22:58:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3070.126673] usb usb9: usbfs: process 9121 (syz-executor3) did not claim interface 0 before use [ 3070.155051] kernel msg: ebtables bug: please report to author: bad policy 22:58:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3070.175674] usb usb9: usbfs: process 9130 (syz-executor3) did not claim interface 0 before use 22:58:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x500}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3070.220634] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3070.240796] usb usb9: usbfs: process 9136 (syz-executor5) did not claim interface 2 before use [ 3070.280514] usb usb9: usbfs: process 9143 (syz-executor5) did not claim interface 2 before use [ 3070.281848] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0xa1, 0x2}) ioctl$BLKRAGET(r2, 0x1263, 0x0) [ 3070.365138] kernel msg: ebtables bug: please report to author: bad policy 22:58:00 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x23b}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3070.405929] usb usb9: usbfs: process 9154 (syz-executor3) did not claim interface 0 before use [ 3070.435242] kernel msg: ebtables bug: please report to author: bad policy 22:58:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3070.473770] usb usb9: usbfs: process 9162 (syz-executor3) did not claim interface 0 before use 22:58:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3070.554404] usb usb9: usbfs: process 9168 (syz-executor5) did not claim interface 2 before use [ 3070.577134] kernel msg: ebtables bug: please report to author: bad policy 22:58:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x600}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:58:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:00 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3070.597554] usb usb9: usbfs: process 9181 (syz-executor5) did not claim interface 2 before use [ 3070.609082] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3070.620560] kernel msg: ebtables bug: please report to author: bad policy 22:58:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3070.647525] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:00 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:00 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x23c}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3070.721291] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #161 22:58:00 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x700}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3070.778182] usb usb9: usbfs: process 9205 (syz-executor3) did not claim interface 0 before use [ 3070.792377] kernel msg: ebtables bug: please report to author: bad policy 22:58:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3070.833937] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3070.943738] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #161 22:58:01 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:01 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x23d}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3070.985021] usb usb9: usbfs: process 9220 (syz-executor3) did not claim interface 0 before use [ 3070.998633] kernel msg: ebtables bug: please report to author: bad policy [ 3071.006195] usb usb9: usbfs: process 9234 (syz-executor3) did not claim interface 0 before use [ 3071.016227] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0xa00}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:58:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3071.074851] kernel msg: ebtables bug: please report to author: bad policy [ 3071.141793] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #161 22:58:01 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3071.196674] usb usb9: usbfs: process 9253 (syz-executor3) did not claim interface 0 before use [ 3071.236180] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:01 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x23e}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3071.240010] kernel msg: ebtables bug: please report to author: bad policy [ 3071.270743] usb usb9: usbfs: process 9264 (syz-executor3) did not claim interface 0 before use 22:58:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x2000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3071.296999] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:01 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3071.475901] kernel msg: ebtables bug: please report to author: bad policy [ 3071.502176] usb usb9: usbfs: process 9287 (syz-executor3) did not claim interface 0 before use [ 3071.509256] kernel msg: ebtables bug: please report to author: bad policy 22:58:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x3f00}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:58:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, 0x0) [ 3071.548665] usb usb9: usbfs: process 9298 (syz-executor3) did not claim interface 0 before use 22:58:01 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x23f}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3071.590762] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:01 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:01 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3071.720225] usb usb9: usbfs: process 9315 (syz-executor3) did not claim interface 0 before use [ 3071.729473] kernel msg: ebtables bug: please report to author: bad policy [ 3071.747158] kernel msg: ebtables bug: please report to author: bad policy [ 3071.754088] usb usb9: usbfs: process 9323 (syz-executor3) did not claim interface 0 before use 22:58:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x4800}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:58:01 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3071.782147] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)) 22:58:02 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x240}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3071.942821] usb usb9: usbfs: process 9341 (syz-executor3) did not claim interface 0 before use 22:58:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x4c00}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:58:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3071.989430] kernel msg: ebtables bug: please report to author: bad policy [ 3072.001719] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3072.005410] kernel msg: ebtables bug: please report to author: bad policy [ 3072.021213] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #161 22:58:02 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3072.083055] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3072.123516] kernel msg: ebtables bug: please report to author: bad policy [ 3072.132159] usb usb9: usbfs: process 9365 (syz-executor3) did not claim interface 0 before use 22:58:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000100)) 22:58:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:02 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x241}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:58:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x6000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3072.175059] usb usb9: usbfs: process 9371 (syz-executor3) did not claim interface 0 before use [ 3072.247000] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #161 22:58:02 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3072.291991] kernel msg: ebtables bug: please report to author: bad policy [ 3072.326594] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor4' sets config #0 22:58:02 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:02 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0xe6}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3072.383425] usb usb9: usbfs: process 9396 (syz-executor3) did not claim interface 0 before use [ 3072.401167] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x6800}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:58:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3072.451382] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #161 22:58:02 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x242}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3072.567615] kernel msg: ebtables bug: please report to author: bad policy [ 3072.568648] [ 3072.576204] ====================================================== [ 3072.582507] WARNING: possible circular locking dependency detected [ 3072.588811] 4.20.0+ #9 Not tainted [ 3072.592332] ------------------------------------------------------ [ 3072.598631] blkid/9408 is trying to acquire lock: [ 3072.603453] 000000001bb105e9 (&p->pi_lock){-.-.}, at: try_to_wake_up+0xb9/0x1480 [ 3072.611026] [ 3072.611026] but task is already holding lock: [ 3072.616998] 00000000b527fdbd (&pgdat->kswapd_wait){....}, at: __wake_up_common_lock+0x19b/0x390 [ 3072.625835] [ 3072.625835] which lock already depends on the new lock. [ 3072.625835] [ 3072.634129] [ 3072.634129] the existing dependency chain (in reverse order) is: [ 3072.641772] [ 3072.641772] -> #4 (&pgdat->kswapd_wait){....}: [ 3072.647833] _raw_spin_lock_irqsave+0x95/0xcd [ 3072.652841] __wake_up_common_lock+0x19b/0x390 [ 3072.657930] __wake_up+0xe/0x10 [ 3072.661717] wakeup_kswapd+0x5ba/0x8f0 [ 3072.666145] steal_suitable_fallback+0x50d/0x7c0 [ 3072.671422] get_page_from_freelist+0x2f53/0x5190 [ 3072.676790] __alloc_pages_nodemask+0x4fd/0xdc0 [ 3072.681969] alloc_pages_vma+0xdd/0x540 [ 3072.686457] __handle_mm_fault+0x2582/0x5690 [ 3072.691398] handle_mm_fault+0x4ec/0xc80 [ 3072.695974] __do_page_fault+0x5da/0xd60 [ 3072.700552] do_page_fault+0xe6/0x7d8 [ 3072.704875] page_fault+0x1e/0x30 [ 3072.708828] [ 3072.708828] -> #3 (&(&zone->lock)->rlock){-.-.}: [ 3072.715054] _raw_spin_lock_irqsave+0x95/0xcd [ 3072.720079] get_page_from_freelist+0x13d0/0x5190 [ 3072.725607] __alloc_pages_nodemask+0x4fd/0xdc0 [ 3072.730793] alloc_pages_current+0x107/0x210 [ 3072.735715] depot_save_stack+0x3da/0x460 [ 3072.740388] save_stack+0xa9/0xd0 [ 3072.744350] kasan_kmalloc+0xcf/0xe0 [ 3072.748570] kasan_slab_alloc+0xf/0x20 [ 3072.752962] kmem_cache_alloc+0x11a/0x710 [ 3072.757637] __debug_object_init+0xb1d/0x12d0 [ 3072.762667] debug_object_activate+0x348/0x550 [ 3072.767757] add_timer+0x4e6/0x1470 [ 3072.771912] __queue_delayed_work+0x253/0x390 [ 3072.776915] queue_delayed_work_on+0x19a/0x200 [ 3072.782075] check_lifetime+0x57e/0xa40 [ 3072.786567] process_one_work+0xd0c/0x1ce0 [ 3072.791314] worker_thread+0x143/0x14a0 [ 3072.795796] kthread+0x357/0x430 [ 3072.799675] ret_from_fork+0x3a/0x50 [ 3072.803905] [ 3072.803905] -> #2 (&base->lock){-.-.}: [ 3072.809263] _raw_spin_lock_irqsave+0x95/0xcd [ 3072.814263] lock_timer_base+0xb7/0x2a0 [ 3072.818745] add_timer+0x884/0x1470 [ 3072.822905] __queue_delayed_work+0x253/0x390 [ 3072.827908] queue_delayed_work_on+0x19a/0x200 [ 3072.833025] psi_task_change+0x3ea/0x590 [ 3072.837626] activate_task+0x1f8/0x470 [ 3072.842023] wake_up_new_task+0x50c/0xd30 [ 3072.846679] _do_fork+0x2a5/0x1170 [ 3072.850736] kernel_thread+0x34/0x40 [ 3072.854972] rest_init+0x28/0x37b [ 3072.859012] arch_call_rest_init+0xe/0x1b [ 3072.863685] start_kernel+0x882/0x8bd [ 3072.868001] x86_64_start_reservations+0x29/0x2b [ 3072.873269] x86_64_start_kernel+0x77/0x7b [ 3072.878018] secondary_startup_64+0xa4/0xb0 [ 3072.882872] [ 3072.882872] -> #1 (&rq->lock){-.-.}: [ 3072.888056] _raw_spin_lock+0x2f/0x40 [ 3072.892369] task_fork_fair+0xb5/0x7a0 [ 3072.896764] sched_fork+0x437/0xb90 [ 3072.900896] copy_process+0x1ff6/0x8730 [ 3072.905378] _do_fork+0x1a9/0x1170 [ 3072.909429] kernel_thread+0x34/0x40 [ 3072.913650] rest_init+0x28/0x37b [ 3072.917611] arch_call_rest_init+0xe/0x1b [ 3072.922262] start_kernel+0x882/0x8bd [ 3072.926573] x86_64_start_reservations+0x29/0x2b [ 3072.931853] x86_64_start_kernel+0x77/0x7b [ 3072.936602] secondary_startup_64+0xa4/0xb0 [ 3072.941420] [ 3072.941420] -> #0 (&p->pi_lock){-.-.}: [ 3072.946782] lock_acquire+0x1db/0x570 [ 3072.951092] _raw_spin_lock_irqsave+0x95/0xcd [ 3072.956099] try_to_wake_up+0xb9/0x1480 [ 3072.960586] default_wake_function+0x30/0x50 [ 3072.965531] autoremove_wake_function+0x79/0x360 [ 3072.970800] __wake_up_common+0x1d3/0x7d0 [ 3072.975457] __wake_up_common_lock+0x1c6/0x390 [ 3072.980551] __wake_up+0xe/0x10 [ 3072.984359] wakeup_kswapd+0x5ba/0x8f0 [ 3072.988775] steal_suitable_fallback+0x50d/0x7c0 [ 3072.994035] get_page_from_freelist+0x2f53/0x5190 [ 3072.999383] __alloc_pages_nodemask+0x4fd/0xdc0 [ 3073.004571] alloc_pages_vma+0xdd/0x540 [ 3073.009051] __handle_mm_fault+0x2582/0x5690 [ 3073.013964] handle_mm_fault+0x4ec/0xc80 [ 3073.018531] __do_page_fault+0x5da/0xd60 [ 3073.023105] do_page_fault+0xe6/0x7d8 [ 3073.027934] page_fault+0x1e/0x30 [ 3073.031887] [ 3073.031887] other info that might help us debug this: [ 3073.031887] [ 3073.040015] Chain exists of: [ 3073.040015] &p->pi_lock --> &(&zone->lock)->rlock --> &pgdat->kswapd_wait [ 3073.040015] [ 3073.051459] Possible unsafe locking scenario: [ 3073.051459] [ 3073.057505] CPU0 CPU1 [ 3073.062155] ---- ---- [ 3073.066818] lock(&pgdat->kswapd_wait); [ 3073.070867] lock(&(&zone->lock)->rlock); [ 3073.077607] lock(&pgdat->kswapd_wait); [ 3073.084172] lock(&p->pi_lock); [ 3073.087528] [ 3073.087528] *** DEADLOCK *** [ 3073.087528] [ 3073.093571] 3 locks held by blkid/9408: [ 3073.097539] #0: 00000000227f12ab (&mm->mmap_sem){++++}, at: __do_page_fault+0x339/0xd60 [ 3073.105774] #1: 00000000aec24ba0 (&(&zone->lock)->rlock){-.-.}, at: get_page_from_freelist+0x1ab1/0x5190 [ 3073.115482] #2: 00000000b527fdbd (&pgdat->kswapd_wait){....}, at: __wake_up_common_lock+0x19b/0x390 [ 3073.124760] [ 3073.124760] stack backtrace: [ 3073.129261] CPU: 1 PID: 9408 Comm: blkid Not tainted 4.20.0+ #9 [ 3073.135304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3073.144647] Call Trace: [ 3073.147237] dump_stack+0x1db/0x2d0 [ 3073.150861] ? dump_stack_print_info.cold+0x20/0x20 [ 3073.155907] ? print_stack_trace+0x77/0xb0 [ 3073.160143] ? vprintk_func+0x86/0x189 [ 3073.164034] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 3073.169393] __lock_acquire+0x3014/0x4a30 [ 3073.173539] ? mark_held_locks+0x100/0x100 [ 3073.177770] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3073.182781] ? bpf_prog_kallsyms_find+0xca/0x4b0 [ 3073.187533] ? module_enable_ro.part.0+0xe0/0xe0 [ 3073.192312] ? __lock_acquire+0x572/0x4a30 [ 3073.196556] ? lock_downgrade+0x910/0x910 [ 3073.200698] ? lock_release+0xc40/0xc40 [ 3073.204666] ? kasan_check_read+0x11/0x20 [ 3073.208813] ? rcu_read_unlock_special+0x380/0x380 [ 3073.213747] ? rcu_softirq_qs+0x20/0x20 [ 3073.217721] ? is_bpf_text_address+0xd3/0x170 [ 3073.222209] ? kernel_text_address+0x73/0xf0 [ 3073.226616] ? __kernel_text_address+0xd/0x40 [ 3073.231121] lock_acquire+0x1db/0x570 [ 3073.234944] ? try_to_wake_up+0xb9/0x1480 [ 3073.239087] ? lock_release+0xc40/0xc40 [ 3073.243054] ? trace_hardirqs_on_caller+0x310/0x310 [ 3073.248058] ? save_trace+0xe0/0x290 [ 3073.251764] _raw_spin_lock_irqsave+0x95/0xcd [ 3073.256248] ? try_to_wake_up+0xb9/0x1480 [ 3073.260389] try_to_wake_up+0xb9/0x1480 [ 3073.264359] ? migrate_swap_stop+0x920/0x920 [ 3073.268778] ? rb_erase_cached+0xb12/0x3590 [ 3073.273096] ? rb_next+0x140/0x140 [ 3073.276628] ? add_lock_to_list.isra.0+0x450/0x450 [ 3073.281568] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3073.286334] ? lockdep_hardirqs_on+0x415/0x5d0 [ 3073.290907] ? retint_kernel+0x2d/0x2d [ 3073.294797] default_wake_function+0x30/0x50 [ 3073.299197] autoremove_wake_function+0x79/0x360 [ 3073.303948] ? kasan_check_read+0x11/0x20 [ 3073.308093] ? finish_wait+0x490/0x490 [ 3073.311972] ? __lock_is_held+0xb6/0x140 [ 3073.316033] __wake_up_common+0x1d3/0x7d0 [ 3073.320175] ? kasan_check_read+0x11/0x20 [ 3073.324314] ? wait_woken+0x250/0x250 [ 3073.328111] ? zone_watermark_ok_safe+0x143/0x420 [ 3073.332954] __wake_up_common_lock+0x1c6/0x390 [ 3073.337532] ? __wake_up_common+0x7d0/0x7d0 [ 3073.341864] ? __lock_is_held+0xb6/0x140 [ 3073.345922] __wake_up+0xe/0x10 [ 3073.349200] wakeup_kswapd+0x5ba/0x8f0 [ 3073.353075] ? isolate_lru_page+0x1d90/0x1d90 [ 3073.357565] ? mark_held_locks+0xb1/0x100 [ 3073.361703] ? free_unref_page_list+0xb4b/0x10e0 [ 3073.366449] ? free_unref_page_list+0xb4b/0x10e0 [ 3073.371208] ? lockdep_hardirqs_on+0x415/0x5d0 [ 3073.375813] steal_suitable_fallback+0x50d/0x7c0 [ 3073.380562] ? move_freepages_block+0xff0/0xff0 [ 3073.385236] ? unreserve_highatomic_pageblock+0x5b0/0x5b0 [ 3073.390765] get_page_from_freelist+0x2f53/0x5190 [ 3073.395624] ? __isolate_free_page+0x6e0/0x6e0 [ 3073.400197] ? print_usage_bug+0xd0/0xd0 [ 3073.404245] ? __update_load_avg_se+0xa80/0xa80 [ 3073.408907] ? __lock_acquire+0x572/0x4a30 [ 3073.413172] ? mark_held_locks+0x100/0x100 [ 3073.417409] ? add_lock_to_list.isra.0+0x450/0x450 [ 3073.422341] ? mark_held_locks+0x100/0x100 [ 3073.426567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3073.432114] ? mark_held_locks+0x100/0x100 [ 3073.436353] ? find_held_lock+0x35/0x120 [ 3073.440404] ? add_lock_to_list.isra.0+0x450/0x450 [ 3073.445333] ? __debug_object_init+0x1c0/0x12d0 [ 3073.449989] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 3073.455085] ? add_lock_to_list.isra.0+0x450/0x450 [ 3073.460020] ? debug_object_activate+0x2b0/0x550 [ 3073.464770] ? find_held_lock+0x35/0x120 [ 3073.468842] ? __lock_is_held+0xb6/0x140 [ 3073.472907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3073.478439] ? should_fail+0x1e6/0xd22 [ 3073.482332] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3073.487426] ? ___might_sleep+0x1e7/0x310 [ 3073.491569] ? arch_local_save_flags+0x50/0x50 [ 3073.496144] ? lock_release+0xc40/0xc40 [ 3073.500113] ? lock_acquire+0x1db/0x570 [ 3073.504078] ? print_usage_bug+0xd0/0xd0 [ 3073.508136] __alloc_pages_nodemask+0x4fd/0xdc0 [ 3073.512800] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 3073.517812] ? mark_held_locks+0x100/0x100 [ 3073.522042] ? pmd_val+0x85/0x100 [ 3073.525495] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3073.531033] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 3073.536579] alloc_pages_vma+0xdd/0x540 [ 3073.540564] __handle_mm_fault+0x2582/0x5690 [ 3073.544966] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3073.549841] ? check_preemption_disabled+0x48/0x290 [ 3073.554866] ? handle_mm_fault+0x3cc/0xc80 [ 3073.559111] ? lock_downgrade+0x910/0x910 [ 3073.563250] ? kasan_check_read+0x11/0x20 [ 3073.567390] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3073.572660] ? rcu_read_unlock_special+0x380/0x380 [ 3073.577584] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3073.583112] ? check_preemption_disabled+0x48/0x290 [ 3073.588137] handle_mm_fault+0x4ec/0xc80 [ 3073.592193] ? __handle_mm_fault+0x5690/0x5690 [ 3073.596767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3073.602294] ? vmacache_update+0x114/0x140 [ 3073.606530] __do_page_fault+0x5da/0xd60 [ 3073.610593] do_page_fault+0xe6/0x7d8 [ 3073.614398] ? trace_hardirqs_on_caller+0xc0/0x310 [ 3073.619318] ? vmalloc_sync_all+0x30/0x30 [ 3073.623454] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 3073.628900] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3073.633842] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3073.638884] ? page_fault+0x8/0x30 [ 3073.642426] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3073.647263] ? page_fault+0x8/0x30 [ 3073.650801] page_fault+0x1e/0x30 [ 3073.654243] RIP: 0033:0x7fe53be4fc00 [ 3073.657951] Code: 36 00 01 00 00 00 48 8b 05 7d 82 36 00 89 1d c7 d5 36 00 48 89 2d b8 d5 36 00 c7 44 24 0c 01 00 00 00 c7 44 24 08 f6 75 ae 03 <4c> 89 20 48 8d 05 8e f2 12 00 48 89 04 24 0f b6 05 84 f2 12 00 84 [ 3073.676840] RSP: 002b:00007ffc77bd62a0 EFLAGS: 00010246 [ 3073.682204] RAX: 00007fe53c1baec8 RBX: 0000000000000005 RCX: 00007ffc77bd63b8 [ 3073.689467] RDX: 00007ffc77bd63b8 RSI: 00007ffc77bd6388 RDI: 000000000000037f [ 3073.696737] RBP: 00007ffc77bd6388 R08: 000000000000000b R09: 0000000000000001 [ 3073.704001] R10: 000000000000000d R11: 0000000000000002 R12: 00007ffc77bd63b8 [ 3073.711260] R13: 00007ffc77bd63b8 R14: 0000000000000002 R15: 0000000000000000 22:58:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x6c00}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3073.721536] usb usb9: usbfs: process 9412 (syz-executor3) did not claim interface 0 before use [ 3073.751670] usb usb9: usbfs: process 9418 (syz-executor3) did not claim interface 0 before use [ 3073.765656] kobject: 'loop3' (00000000d0ea760a): kobject_uevent_env 22:58:03 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(0x0, 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3073.772122] kobject: 'loop3' (00000000d0ea760a): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:58:03 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(0x0, 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3073.838761] kobject: 'loop5' (0000000005921aee): kobject_uevent_env [ 3073.857529] usb usb9: usbfs: process 9424 (syz-executor3) did not claim interface 0 before use [ 3073.865854] kobject: 'loop5' (0000000005921aee): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:58:04 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0xe3}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:58:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x7400}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3073.882817] usb usb9: usbfs: process 9431 (syz-executor3) did not claim interface 0 before use [ 3073.902560] kobject: 'loop5' (0000000005921aee): kobject_uevent_env 22:58:04 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:04 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x243}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3073.932521] kobject: 'loop5' (0000000005921aee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3073.944476] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) [ 3073.985200] kobject: 'loop2' (000000005453f9a6): kobject_uevent_env [ 3073.991665] kobject: 'loop2' (000000005453f9a6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3074.036068] usb usb9: usbfs: process 9448 (syz-executor3) did not claim interface 0 before use [ 3074.040097] kobject: 'loop4' (0000000093a85c4c): kobject_uevent_env 22:58:04 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) 22:58:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x7a00}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) [ 3074.080235] kobject: 'loop4' (0000000093a85c4c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3074.099007] kobject: 'loop1' (0000000028876136): kobject_uevent_env 22:58:04 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3074.121928] kobject: 'loop1' (0000000028876136): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3074.145960] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 22:58:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x1000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:58:04 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x244}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:58:04 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x242}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3074.168824] kobject: 'loop3' (00000000d0ea760a): kobject_uevent_env [ 3074.187413] kobject: 'loop3' (00000000d0ea760a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3074.226680] kobject: 'loop5' (0000000005921aee): kobject_uevent_env [ 3074.238027] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3074.252345] kobject: 'loop5' (0000000005921aee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3074.322221] kobject: 'loop1' (0000000028876136): kobject_uevent_env [ 3074.353240] kobject: 'loop1' (0000000028876136): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3074.391899] kobject: 'loop3' (00000000d0ea760a): kobject_uevent_env [ 3074.402971] kobject: 'loop3' (00000000d0ea760a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3074.431807] kobject: 'loop5' (0000000005921aee): kobject_uevent_env [ 3074.446274] kobject: 'loop5' (0000000005921aee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3074.479022] kobject: 'loop4' (0000000093a85c4c): kobject_uevent_env [ 3074.498383] kobject: 'loop4' (0000000093a85c4c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3074.634382] kobject: 'batman_adv' (000000005bd9edb2): kobject_uevent_env [ 3074.641255] kobject: 'batman_adv' (000000005bd9edb2): kobject_uevent_env: filter function caused the event to drop! [ 3074.653777] kobject: 'batman_adv' (000000005bd9edb2): kobject_cleanup, parent (null) [ 3074.662582] kobject: 'batman_adv' (000000005bd9edb2): calling ktype release [ 3074.670453] kobject: (000000005bd9edb2): dynamic_kobj_release [ 3074.677835] kobject: 'batman_adv': free name [ 3074.682344] kobject: 'rx-0' (0000000092139812): kobject_cleanup, parent 00000000de23dd4e [ 3074.690691] kobject: 'rx-0' (0000000092139812): auto cleanup 'remove' event [ 3074.699372] kobject: 'rx-0' (0000000092139812): kobject_uevent_env [ 3074.706224] kobject: 'rx-0' (0000000092139812): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 3074.718239] kobject: 'rx-0' (0000000092139812): auto cleanup kobject_del [ 3074.725159] kobject: 'rx-0' (0000000092139812): calling ktype release [ 3074.731728] kobject: 'rx-0': free name [ 3074.737093] kobject: 'tx-0' (00000000f311451b): kobject_cleanup, parent 00000000de23dd4e [ 3074.745462] kobject: 'tx-0' (00000000f311451b): auto cleanup 'remove' event [ 3074.752570] kobject: 'tx-0' (00000000f311451b): kobject_uevent_env [ 3074.760728] kobject: 'tx-0' (00000000f311451b): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 3074.771305] kobject: 'tx-0' (00000000f311451b): auto cleanup kobject_del [ 3074.778210] kobject: 'tx-0' (00000000f311451b): calling ktype release [ 3074.784808] kobject: 'tx-0': free name [ 3074.788704] kobject: 'queues' (00000000de23dd4e): kobject_cleanup, parent (null) [ 3074.797120] kobject: 'queues' (00000000de23dd4e): calling ktype release [ 3074.803870] kobject: 'queues' (00000000de23dd4e): kset_release [ 3074.809851] kobject: 'queues': free name [ 3074.814149] kobject: 'syz_tun' (00000000b54be41e): kobject_uevent_env [ 3074.820852] kobject: 'syz_tun' (00000000b54be41e): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 3074.832893] kobject: 'batman_adv' (0000000064bdfcbd): kobject_uevent_env [ 3074.839787] kobject: 'batman_adv' (0000000064bdfcbd): kobject_uevent_env: filter function caused the event to drop! [ 3074.850426] kobject: 'batman_adv' (0000000064bdfcbd): kobject_cleanup, parent (null) [ 3074.859212] kobject: 'batman_adv' (0000000064bdfcbd): calling ktype release [ 3074.866353] kobject: (0000000064bdfcbd): dynamic_kobj_release [ 3074.872235] kobject: 'batman_adv': free name [ 3074.876855] kobject: 'rx-0' (0000000018ca0c5c): kobject_cleanup, parent 00000000999c7443 [ 3074.885125] kobject: 'rx-0' (0000000018ca0c5c): auto cleanup 'remove' event [ 3074.892214] kobject: 'rx-0' (0000000018ca0c5c): kobject_uevent_env [ 3074.899221] kobject: 'rx-0' (0000000018ca0c5c): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 3074.909901] kobject: 'rx-0' (0000000018ca0c5c): auto cleanup kobject_del [ 3074.917062] kobject: 'rx-0' (0000000018ca0c5c): calling ktype release [ 3074.923667] kobject: 'rx-0': free name [ 3074.927647] kobject: 'tx-0' (00000000dd63d8ba): kobject_cleanup, parent 00000000999c7443 [ 3074.935911] kobject: 'tx-0' (00000000dd63d8ba): auto cleanup 'remove' event [ 3074.943000] kobject: 'tx-0' (00000000dd63d8ba): kobject_uevent_env [ 3074.949367] kobject: 'tx-0' (00000000dd63d8ba): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 3074.959839] kobject: 'tx-0' (00000000dd63d8ba): auto cleanup kobject_del [ 3074.966737] kobject: 'tx-0' (00000000dd63d8ba): calling ktype release [ 3074.973310] kobject: 'tx-0': free name [ 3074.977229] kobject: 'queues' (00000000999c7443): kobject_cleanup, parent (null) [ 3074.985672] kobject: 'queues' (00000000999c7443): calling ktype release [ 3074.992404] kobject: 'queues' (00000000999c7443): kset_release [ 3074.998389] kobject: 'queues': free name [ 3075.002729] kobject: 'syz_tun' (000000002e1ea3b9): kobject_uevent_env [ 3075.009373] kobject: 'syz_tun' (000000002e1ea3b9): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 3075.019185] kobject: 'syz_tun' (00000000b54be41e): kobject_cleanup, parent (null) [ 3075.027774] kobject: 'syz_tun' (00000000b54be41e): calling ktype release [ 3075.034703] kobject: 'syz_tun': free name [ 3075.040525] kobject: 'rx-0' (00000000d21472aa): kobject_cleanup, parent 00000000161d1f81 [ 3075.048814] kobject: 'rx-0' (00000000d21472aa): auto cleanup 'remove' event [ 3075.056439] kobject: 'rx-0' (00000000d21472aa): kobject_uevent_env [ 3075.062777] kobject: 'rx-0' (00000000d21472aa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3075.072874] kobject: 'rx-0' (00000000d21472aa): auto cleanup kobject_del [ 3075.079778] kobject: 'rx-0' (00000000d21472aa): calling ktype release 22:58:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff'}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:05 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, 0x0) 22:58:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xfffffffffffffffe}, {}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x0, 0xd, 'erspan0\x00', 'nlmon0\x00', 'teql0\x00', 'bridge0\x00', @empty, [], @dev={[], 0x19}, [], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:ppp_device_t:s0\x00'}}}}]}]}, 0x2a8) 22:58:05 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x245}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") 22:58:05 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x242}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3075.086393] kobject: 'rx-0': free name [ 3075.090746] kobject: 'tx-0' (00000000a7f0b92d): kobject_cleanup, parent 00000000161d1f81 22:58:05 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)) [ 3075.128295] kobject: 'tx-0' (00000000a7f0b92d): auto cleanup 'remove' event [ 3075.138256] kobject: 'loop5' (0000000005921aee): kobject_uevent_env [ 3075.143331] kobject: 'tx-0' (00000000a7f0b92d): kobject_uevent_env [ 3075.152598] kobject: 'loop5' (0000000005921aee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3075.153349] kobject: 'tx-0' (00000000a7f0b92d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3075.196219] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3075.199967] kobject: 'tx-0' (00000000a7f0b92d): auto cleanup kobject_del [ 3075.228811] kobject: 'tx-0' (00000000a7f0b92d): calling ktype release [ 3075.237673] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #0 22:58:05 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(0x0, 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)={0xa1}) [ 3075.248753] kobject: 'tx-0': free name [ 3075.252802] kobject: 'queues' (00000000161d1f81): kobject_cleanup, parent (null) [ 3075.271023] kobject: 'queues' (00000000161d1f81): calling ktype release [ 3075.273640] kobject: 'loop5' (0000000005921aee): kobject_uevent_env [ 3075.289860] kobject: 'queues' (00000000161d1f81): kset_release 22:58:05 executing program 5 (fault-call:2 fault-nth:0): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)) [ 3075.296260] kobject: 'queues': free name [ 3075.297359] kobject: 'loop5' (0000000005921aee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3075.300803] kobject: 'ip6gre0' (00000000b9df7748): kobject_uevent_env [ 3075.316729] kobject: 'ip6gre0' (00000000b9df7748): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3075.333419] kobject: 'batman_adv' (000000000aee1a2e): kobject_uevent_env [ 3075.342722] kobject: 'batman_adv' (000000000aee1a2e): kobject_uevent_env: filter function caused the event to drop! [ 3075.356509] kobject: 'batman_adv' (000000000aee1a2e): kobject_cleanup, parent (null) [ 3075.365779] kobject: 'batman_adv' (000000000aee1a2e): calling ktype release [ 3075.367705] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #0 [ 3075.373054] kobject: (000000000aee1a2e): dynamic_kobj_release [ 3075.382140] FAULT_INJECTION: forcing a failure. [ 3075.382140] name failslab, interval 1, probability 0, space 0, times 0 [ 3075.387763] kobject: 'batman_adv': free name [ 3075.398619] CPU: 0 PID: 9507 Comm: syz-executor5 Not tainted 4.20.0+ #9 [ 3075.398628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3075.398633] Call Trace: [ 3075.398654] dump_stack+0x1db/0x2d0 [ 3075.398671] ? dump_stack_print_info.cold+0x20/0x20 [ 3075.398692] should_fail.cold+0xa/0x15 [ 3075.403461] kobject: 'rx-0' (00000000d63b5a42): kobject_cleanup, parent 0000000018a85765 [ 3075.409827] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3075.409954] ? device_rename+0x200/0x200 [ 3075.409979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3075.419503] kobject: 'rx-0' (00000000d63b5a42): auto cleanup 'remove' event [ 3075.421890] ? refcount_inc_not_zero_checked+0x1d9/0x2e0 [ 3075.421923] __should_failslab+0x121/0x190 [ 3075.421940] should_failslab+0x9/0x14 [ 3075.421957] kmem_cache_alloc+0x47/0x710 [ 3075.425769] kobject: 'rx-0' (00000000d63b5a42): kobject_uevent_env [ 3075.430579] __sigqueue_alloc+0x3ca/0x710 [ 3075.430595] ? dequeue_signal+0x650/0x650 [ 3075.430615] ? processcompl_compat+0x680/0x680 [ 3075.434673] kobject: 'rx-0' (00000000d63b5a42): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3075.442718] ? __check_object_size+0xa3/0x77a [ 3075.442737] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3075.442750] ? kstrtouint+0x152/0x1c0 [ 3075.442767] __send_signal+0xd42/0x1ae0 [ 3075.448059] kobject: 'rx-0' (00000000d63b5a42): auto cleanup kobject_del [ 3075.451945] ? __task_pid_nr_ns+0x630/0x630 [ 3075.451962] ? prepare_signal+0xe10/0xe10 [ 3075.451975] ? pid_task+0x111/0x210 22:58:05 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000100)) [ 3075.451989] ? kstrtouint+0x1c0/0x1c0 [ 3075.457739] kobject: 'rx-0' (00000000d63b5a42): calling ktype release [ 3075.464620] ? lock_acquire+0x1db/0x570 [ 3075.464649] ? force_sig_info+0x55/0x310 [ 3075.464666] ? kasan_check_read+0x11/0x20 [ 3075.464681] ? do_raw_spin_lock+0x156/0x360 [ 3075.464695] ? lock_release+0xc40/0xc40 [ 3075.470296] kobject: 'rx-0': free name [ 3075.474350] ? rwlock_bug.part.0+0x90/0x90 [ 3075.474365] ? trace_hardirqs_on_caller+0x310/0x310 [ 3075.474390] ? proc_cwd_link+0x1d0/0x1d0 [ 3075.474405] send_signal+0x49/0xd0 [ 3075.478534] kobject: 'tx-0' (00000000b71683a2): kobject_cleanup, parent 0000000018a85765 [ 3075.482354] force_sig_info+0x251/0x310 [ 3075.482374] force_sig_fault+0x11b/0x180 [ 3075.482389] ? force_sigsegv+0x120/0x120 [ 3075.482407] ? kasan_check_write+0x14/0x20 [ 3075.488928] kobject: 'tx-0' (00000000b71683a2): auto cleanup 'remove' event [ 3075.492875] ? up_read+0x212/0x2b0 [ 3075.492895] __bad_area_nosemaphore+0x332/0x420 [ 3075.492908] ? vmacache_find+0x65/0x310 [ 3075.492925] bad_area+0x69/0x80 [ 3075.497238] kobject: 'tx-0' (00000000b71683a2): kobject_uevent_env [ 3075.501629] __do_page_fault+0x971/0xd60 [ 3075.501644] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3075.501660] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3075.501680] do_page_fault+0xe6/0x7d8 [ 3075.511889] kobject: 'tx-0' (00000000b71683a2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3075.516186] ? trace_hardirqs_on_caller+0xc0/0x310 [ 3075.516203] ? vmalloc_sync_all+0x30/0x30 [ 3075.516216] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 3075.516233] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3075.516249] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3075.521406] kobject: 'tx-0' (00000000b71683a2): auto cleanup kobject_del [ 3075.525032] ? page_fault+0x8/0x30 [ 3075.525051] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3075.525068] ? page_fault+0x8/0x30 [ 3075.525083] page_fault+0x1e/0x30 [ 3075.525093] RIP: 0033: (null) [ 3075.529241] kobject: 'tx-0' (00000000b71683a2): calling ktype release [ 3075.535883] Code: Bad RIP value. [ 3075.535906] RSP: 002b:00007f18b5421c80 EFLAGS: 00010286 [ 3075.535917] RAX: ffffffffffffffff RBX: 00007f18b5421c90 RCX: 0000000000457ec9 [ 3075.535926] RDX: 0000000020000100 RSI: 0000000080045505 RDI: 0000000000000003 [ 3075.535933] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3075.535941] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f18b54226d4 [ 3075.535949] R13: 00000000004c03e8 R14: 00000000004d1ae0 R15: 0000000000000004 [ 3075.562236] kobject: 'loop5' (0000000005921aee): kobject_uevent_env [ 3075.562583] kobject: 'tx-0': free name [ 3075.566937] kobject: 'loop5' (0000000005921aee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3075.570812] kobject: 'queues' (0000000018a85765): kobject_cleanup, parent (null) [ 3075.600531] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #0 [ 3075.616066] kobject: 'queues' (0000000018a85765): calling ktype release [ 3075.641374] kobject: 'loop5' (0000000005921aee): kobject_uevent_env [ 3075.643888] kobject: 'queues' (0000000018a85765): kset_release [ 3075.643898] kobject: 'queues': free name [ 3075.644252] kobject: 'ip6gretap0' (00000000de723a9f): kobject_uevent_env [ 3075.648551] kobject: 'loop5' (0000000005921aee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3075.653545] kobject: 'ip6gretap0' (00000000de723a9f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3075.872884] kobject: 'syz_tun' (000000002e1ea3b9): kobject_cleanup, parent (null) [ 3075.893429] IPVS: ftp: loaded support on port[0] = 21 [ 3075.899291] kobject: 'syz_tun' (000000002e1ea3b9): calling ktype release [ 3075.904988] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 3075.916931] kobject: 'syz_tun': free name [ 3075.917072] kobject: 'ip6gre0' (00000000b9df7748): kobject_cleanup, parent (null) [ 3075.923248] kobject: 'lo' (0000000007339d1f): kobject_add_internal: parent: 'net', set: 'devices' [ 3075.947577] kobject: 'loop4' (0000000093a85c4c): kobject_uevent_env [ 3075.954015] kobject: 'loop4' (0000000093a85c4c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3075.963202] kobject: 'lo' (0000000007339d1f): kobject_uevent_env [ 3075.966909] kobject: 'ip6gre0' (00000000b9df7748): auto cleanup 'remove' event [ 3075.977506] kobject: 'lo' (0000000007339d1f): fill_kobj_path: path = '/devices/virtual/net/lo' [ 3075.984931] kobject: 'loop1' (0000000028876136): kobject_uevent_env [ 3075.993249] kobject: 'ip6gre0' (00000000b9df7748): kobject_uevent_env 22:58:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000100)={0xa1, 0x0, 0x0, 0x0, 0x0, 0x2000000}) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) 22:58:06 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x2, &(0x7f0000000100)) 22:58:06 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20}, 0x1c) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x242}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x10001, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") [ 3076.002910] kobject: 'loop1' (0000000028876136): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3076.005962] kobject: 'queues' (00000000f7f3db43): kobject_add_internal: parent: 'lo', set: '' [ 3076.020473] kobject: 'ip6gre0' (00000000b9df7748): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3076.059155] kobject: 'ip6gre0' (00000000b9df7748): calling ktype release [ 3076.064331] kobject: 'queues' (00000000f7f3db43): kobject_uevent_env [ 3076.072229] kobject: 'ip6gre0': free name [ 3076.072520] kobject: 'queues' (00000000f7f3db43): kobject_uevent_env: filter function caused the event to drop! [ 3076.088833] kobject: 'loop5' (0000000005921aee): kobject_uevent_env [ 3076.107778] kobject: 'loop5' (0000000005921aee): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3076.114225] kobject: 'rx-0' (000000003f2a8b2c): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.131794] kobject: 'rx-0' (000000003f2a8b2c): kobject_uevent_env [ 3076.138215] kobject: 'rx-0' (000000003f2a8b2c): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 3076.158813] kobject: 'tx-0' (00000000a5d81bf9): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.169063] kobject: 'tx-0' (00000000a5d81bf9): kobject_uevent_env [ 3076.175477] kobject: 'tx-0' (00000000a5d81bf9): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 3076.186643] kobject: 'ip6gretap0' (00000000de723a9f): kobject_cleanup, parent (null) [ 3076.186839] kobject: 'tunl0' (000000008899699e): kobject_add_internal: parent: 'net', set: 'devices' [ 3076.204180] kobject: 'ip6gretap0' (00000000de723a9f): auto cleanup 'remove' event [ 3076.205977] kobject: 'tunl0' (000000008899699e): kobject_uevent_env [ 3076.212305] kobject: 'ip6gretap0' (00000000de723a9f): kobject_uevent_env [ 3076.212315] kobject: 'ip6gretap0' (00000000de723a9f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3076.212321] kobject: 'ip6gretap0' (00000000de723a9f): calling ktype release [ 3076.212343] kobject: 'ip6gretap0': free name [ 3076.221461] kobject: 'tunl0' (000000008899699e): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 3076.258598] kobject: 'queues' (00000000ce6bef22): kobject_add_internal: parent: 'tunl0', set: '' [ 3076.268201] kobject: 'queues' (00000000ce6bef22): kobject_uevent_env [ 3076.274806] kobject: 'queues' (00000000ce6bef22): kobject_uevent_env: filter function caused the event to drop! [ 3076.285087] kobject: 'rx-0' (000000004f30b44d): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.294537] kobject: 'rx-0' (000000004f30b44d): kobject_uevent_env [ 3076.300883] kobject: 'rx-0' (000000004f30b44d): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 3076.311266] kobject: 'tx-0' (00000000644852e8): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.320778] kobject: 'tx-0' (00000000644852e8): kobject_uevent_env [ 3076.327165] kobject: 'tx-0' (00000000644852e8): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 3076.343257] kobject: 'rx-0' (0000000054aef8f8): kobject_cleanup, parent 00000000ea219bf0 [ 3076.351589] kobject: 'rx-0' (0000000054aef8f8): auto cleanup 'remove' event [ 3076.358745] kobject: 'rx-0' (0000000054aef8f8): kobject_uevent_env [ 3076.364006] kobject: 'loop4' (0000000093a85c4c): kobject_uevent_env [ 3076.365130] kobject: 'rx-0' (0000000054aef8f8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3076.365137] kobject: 'rx-0' (0000000054aef8f8): auto cleanup kobject_del [ 3076.365183] kobject: 'rx-0' (0000000054aef8f8): calling ktype release [ 3076.365188] kobject: 'rx-0': free name [ 3076.365229] kobject: 'tx-0' (00000000e1cc9afe): kobject_cleanup, parent 00000000ea219bf0 [ 3076.365236] kobject: 'tx-0' (00000000e1cc9afe): auto cleanup 'remove' event [ 3076.365243] kobject: 'tx-0' (00000000e1cc9afe): kobject_uevent_env [ 3076.365251] kobject: 'tx-0' (00000000e1cc9afe): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3076.365258] kobject: 'tx-0' (00000000e1cc9afe): auto cleanup kobject_del [ 3076.365289] kobject: 'tx-0' (00000000e1cc9afe): calling ktype release [ 3076.365294] kobject: 'tx-0': free name [ 3076.365327] kobject: 'queues' (00000000ea219bf0): kobject_cleanup, parent (null) [ 3076.365332] kobject: 'queues' (00000000ea219bf0): calling ktype release [ 3076.365340] kobject: 'queues' (00000000ea219bf0): kset_release [ 3076.365362] kobject: 'queues': free name [ 3076.365762] kobject: 'ip6tnl0' (000000007ff31d1e): kobject_uevent_env [ 3076.371855] kobject: 'loop4' (0000000093a85c4c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3076.381942] kobject: 'ip6tnl0' (000000007ff31d1e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3076.500342] kobject: 'gre0' (000000002d9ef693): kobject_add_internal: parent: 'net', set: 'devices' [ 3076.511091] kobject: 'gre0' (000000002d9ef693): kobject_uevent_env [ 3076.517906] kobject: 'gre0' (000000002d9ef693): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 3076.527124] kobject: 'queues' (00000000e4b80466): kobject_add_internal: parent: 'gre0', set: '' [ 3076.536888] kobject: 'queues' (00000000e4b80466): kobject_uevent_env [ 3076.543378] kobject: 'queues' (00000000e4b80466): kobject_uevent_env: filter function caused the event to drop! [ 3076.553651] kobject: 'rx-0' (00000000f72ea93b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.563059] kobject: 'rx-0' (00000000f72ea93b): kobject_uevent_env [ 3076.569423] kobject: 'rx-0' (00000000f72ea93b): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 3076.579636] kobject: 'tx-0' (00000000ed3685e0): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.589256] kobject: 'tx-0' (00000000ed3685e0): kobject_uevent_env [ 3076.595638] kobject: 'tx-0' (00000000ed3685e0): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 3076.606341] kobject: 'gretap0' (00000000bfc36b51): kobject_add_internal: parent: 'net', set: 'devices' [ 3076.616689] kobject: 'gretap0' (00000000bfc36b51): kobject_uevent_env [ 3076.623308] kobject: 'gretap0' (00000000bfc36b51): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 3076.633110] kobject: 'queues' (000000007c548b19): kobject_add_internal: parent: 'gretap0', set: '' [ 3076.642772] kobject: 'queues' (000000007c548b19): kobject_uevent_env [ 3076.649672] kobject: 'queues' (000000007c548b19): kobject_uevent_env: filter function caused the event to drop! [ 3076.659942] kobject: 'rx-0' (00000000bb04ea8b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.669426] kobject: 'rx-0' (00000000bb04ea8b): kobject_uevent_env [ 3076.675843] kobject: 'rx-0' (00000000bb04ea8b): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 3076.686415] kobject: 'tx-0' (00000000795f06b6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.695980] kobject: 'tx-0' (00000000795f06b6): kobject_uevent_env [ 3076.702342] kobject: 'tx-0' (00000000795f06b6): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 3076.713416] kobject: 'batman_adv' (00000000a85d55bc): kobject_add_internal: parent: 'gretap0', set: '' [ 3076.724079] kobject: 'ip6tnl0' (000000007ff31d1e): kobject_cleanup, parent (null) [ 3076.729874] IPVS: ftp: loaded support on port[0] = 21 [ 3076.732863] kobject: 'erspan0' (0000000075026679): kobject_add_internal: parent: 'net', set: 'devices' [ 3076.747296] kobject: 'ip6tnl0' (000000007ff31d1e): auto cleanup 'remove' event [ 3076.754721] kobject: 'ip6tnl0' (000000007ff31d1e): kobject_uevent_env [ 3076.755505] kobject: 'erspan0' (0000000075026679): kobject_uevent_env [ 3076.761317] kobject: 'ip6tnl0' (000000007ff31d1e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3076.771220] kobject: 'erspan0' (0000000075026679): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 3076.778678] kobject: 'ip6tnl0' (000000007ff31d1e): calling ktype release [ 3076.791230] kobject: 'queues' (00000000db501574): kobject_add_internal: parent: 'erspan0', set: '' [ 3076.794831] kobject: 'ip6tnl0': free name [ 3076.807570] kobject: 'queues' (00000000db501574): kobject_uevent_env [ 3076.815194] kobject: 'queues' (00000000db501574): kobject_uevent_env: filter function caused the event to drop! [ 3076.825603] kobject: 'rx-0' (000000003ff6dcc2): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.835074] kobject: 'rx-0' (000000003ff6dcc2): kobject_uevent_env [ 3076.841461] kobject: 'rx-0' (000000003ff6dcc2): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 3076.852060] kobject: 'tx-0' (0000000067003284): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.861567] kobject: 'tx-0' (0000000067003284): kobject_uevent_env [ 3076.867977] kobject: 'tx-0' (0000000067003284): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 3076.878956] kobject: 'batman_adv' (00000000b2f06332): kobject_add_internal: parent: 'erspan0', set: '' [ 3076.889483] kobject: 'ip_vti0' (000000003954bd12): kobject_add_internal: parent: 'net', set: 'devices' [ 3076.899868] kobject: 'ip_vti0' (000000003954bd12): kobject_uevent_env [ 3076.907052] kobject: 'ip_vti0' (000000003954bd12): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 3076.916816] kobject: 'queues' (000000000c9bc341): kobject_add_internal: parent: 'ip_vti0', set: '' [ 3076.926506] kobject: 'queues' (000000000c9bc341): kobject_uevent_env [ 3076.932994] kobject: 'queues' (000000000c9bc341): kobject_uevent_env: filter function caused the event to drop! [ 3076.943268] kobject: 'rx-0' (00000000ac362037): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.952714] kobject: 'rx-0' (00000000ac362037): kobject_uevent_env [ 3076.959152] kobject: 'rx-0' (00000000ac362037): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 3076.969687] kobject: 'tx-0' (00000000b3dd1da5): kobject_add_internal: parent: 'queues', set: 'queues' [ 3076.979247] kobject: 'tx-0' (00000000b3dd1da5): kobject_uevent_env [ 3076.985749] kobject: 'tx-0' (00000000b3dd1da5): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 3076.996899] kobject: 'lo' (0000000086ecded8): kobject_add_internal: parent: 'net', set: 'devices' [ 3077.007812] kobject: 'lo' (0000000086ecded8): kobject_uevent_env [ 3077.013958] kobject: 'lo' (0000000086ecded8): fill_kobj_path: path = '/devices/virtual/net/lo' [ 3077.022824] kobject: 'queues' (00000000e3bc1756): kobject_add_internal: parent: 'lo', set: '' [ 3077.032312] kobject: 'queues' (00000000e3bc1756): kobject_uevent_env [ 3077.038848] kobject: 'queues' (00000000e3bc1756): kobject_uevent_env: filter function caused the event to drop! [ 3077.049099] kobject: 'rx-0' (0000000033ca79b2): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.058695] kobject: 'rx-0' (0000000033ca79b2): kobject_uevent_env [ 3077.065050] kobject: 'rx-0' (0000000033ca79b2): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 3077.075160] kobject: 'tx-0' (000000007769ee64): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.084637] kobject: 'tx-0' (000000007769ee64): kobject_uevent_env [ 3077.090952] kobject: 'tx-0' (000000007769ee64): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 3077.104072] kobject: 'rx-0' (0000000008ad3b3d): kobject_cleanup, parent 00000000eb0f9140 [ 3077.112373] kobject: 'rx-0' (0000000008ad3b3d): auto cleanup 'remove' event [ 3077.119517] kobject: 'rx-0' (0000000008ad3b3d): kobject_uevent_env [ 3077.125896] kobject: 'rx-0' (0000000008ad3b3d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3077.135980] kobject: 'rx-0' (0000000008ad3b3d): auto cleanup kobject_del [ 3077.142867] kobject: 'rx-0' (0000000008ad3b3d): calling ktype release [ 3077.149792] kobject: 'rx-0': free name [ 3077.153701] kobject: 'tx-0' (00000000baa24119): kobject_cleanup, parent 00000000eb0f9140 [ 3077.161961] kobject: 'tx-0' (00000000baa24119): auto cleanup 'remove' event [ 3077.169276] kobject: 'tx-0' (00000000baa24119): kobject_uevent_env [ 3077.175634] kobject: 'tx-0' (00000000baa24119): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3077.185953] kobject: 'tx-0' (00000000baa24119): auto cleanup kobject_del [ 3077.192830] kobject: 'tx-0' (00000000baa24119): calling ktype release [ 3077.199430] kobject: 'tx-0': free name [ 3077.203367] kobject: 'queues' (00000000eb0f9140): kobject_cleanup, parent (null) [ 3077.211796] kobject: 'queues' (00000000eb0f9140): calling ktype release [ 3077.218576] kobject: 'queues' (00000000eb0f9140): kset_release [ 3077.224574] kobject: 'queues': free name [ 3077.228850] kobject: 'sit0' (00000000776c0097): kobject_uevent_env [ 3077.235224] kobject: 'sit0' (00000000776c0097): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3077.245616] kobject: 'ip6_vti0' (000000008099e19e): kobject_add_internal: parent: 'net', set: 'devices' [ 3077.256048] kobject: 'ip6_vti0' (000000008099e19e): kobject_uevent_env [ 3077.262723] kobject: 'ip6_vti0' (000000008099e19e): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 3077.272719] kobject: 'queues' (0000000093c61472): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 3077.282462] kobject: 'queues' (0000000093c61472): kobject_uevent_env [ 3077.289013] kobject: 'queues' (0000000093c61472): kobject_uevent_env: filter function caused the event to drop! [ 3077.299543] kobject: 'rx-0' (0000000043ed39e8): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.309088] kobject: 'rx-0' (0000000043ed39e8): kobject_uevent_env [ 3077.315516] kobject: 'rx-0' (0000000043ed39e8): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 3077.326161] kobject: 'tx-0' (00000000f38b943b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.335692] kobject: 'tx-0' (00000000f38b943b): kobject_uevent_env [ 3077.342018] kobject: 'tx-0' (00000000f38b943b): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 3077.353454] kobject: 'tunl0' (0000000033d69ded): kobject_add_internal: parent: 'net', set: 'devices' [ 3077.363799] kobject: 'tunl0' (0000000033d69ded): kobject_uevent_env [ 3077.371314] kobject: 'tunl0' (0000000033d69ded): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 3077.381271] kobject: 'queues' (00000000ac44647d): kobject_add_internal: parent: 'tunl0', set: '' [ 3077.391773] kobject: 'queues' (00000000ac44647d): kobject_uevent_env [ 3077.398858] kobject: 'queues' (00000000ac44647d): kobject_uevent_env: filter function caused the event to drop! [ 3077.410384] kobject: 'rx-0' (0000000090922123): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.420414] kobject: 'rx-0' (0000000090922123): kobject_uevent_env [ 3077.427876] kobject: 'rx-0' (0000000090922123): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 3077.438762] kobject: 'tx-0' (000000001767595b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.449311] kobject: 'tx-0' (000000001767595b): kobject_uevent_env [ 3077.456232] kobject: 'tx-0' (000000001767595b): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 3077.468159] kobject: 'gre0' (0000000060d314b2): kobject_add_internal: parent: 'net', set: 'devices' [ 3077.478442] kobject: 'gre0' (0000000060d314b2): kobject_uevent_env [ 3077.485838] kobject: 'gre0' (0000000060d314b2): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 3077.495640] kobject: 'queues' (0000000001970b6c): kobject_add_internal: parent: 'gre0', set: '' [ 3077.506213] kobject: 'queues' (0000000001970b6c): kobject_uevent_env [ 3077.512711] kobject: 'queues' (0000000001970b6c): kobject_uevent_env: filter function caused the event to drop! [ 3077.523664] kobject: 'rx-0' (0000000051382f4b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.534105] kobject: 'rx-0' (0000000051382f4b): kobject_uevent_env [ 3077.541042] kobject: 'rx-0' (0000000051382f4b): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 3077.552421] kobject: 'tx-0' (0000000092034a8a): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.562547] kobject: 'tx-0' (0000000092034a8a): kobject_uevent_env [ 3077.569863] kobject: 'tx-0' (0000000092034a8a): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 3077.581041] kobject: 'sit0' (00000000776c0097): kobject_cleanup, parent (null) [ 3077.581142] kobject: 'sit0' (000000007903f5f2): kobject_add_internal: parent: 'net', set: 'devices' [ 3077.589627] kobject: 'sit0' (00000000776c0097): auto cleanup 'remove' event [ 3077.602010] kobject: 'sit0' (000000007903f5f2): kobject_uevent_env [ 3077.605905] kobject: 'sit0' (00000000776c0097): kobject_uevent_env [ 3077.612090] kobject: 'sit0' (000000007903f5f2): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 3077.618594] kobject: 'sit0' (00000000776c0097): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3077.630270] kobject: 'queues' (000000008d195303): kobject_add_internal: parent: 'sit0', set: '' [ 3077.637926] kobject: 'sit0' (00000000776c0097): calling ktype release [ 3077.649663] kobject: 'queues' (000000008d195303): kobject_uevent_env [ 3077.653704] kobject: 'sit0': free name [ 3077.660129] kobject: 'queues' (000000008d195303): kobject_uevent_env: filter function caused the event to drop! [ 3077.674306] kobject: 'rx-0' (000000006f88a2d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.683711] kobject: 'rx-0' (000000006f88a2d8): kobject_uevent_env [ 3077.690085] kobject: 'rx-0' (000000006f88a2d8): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 3077.700306] kobject: 'tx-0' (000000006944667d): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.709844] kobject: 'tx-0' (000000006944667d): kobject_uevent_env [ 3077.716214] kobject: 'tx-0' (000000006944667d): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 3077.727589] kobject: 'gretap0' (0000000010900503): kobject_add_internal: parent: 'net', set: 'devices' [ 3077.738563] kobject: 'gretap0' (0000000010900503): kobject_uevent_env [ 3077.745775] kobject: 'gretap0' (0000000010900503): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 3077.756592] kobject: 'queues' (0000000075917ebb): kobject_add_internal: parent: 'gretap0', set: '' [ 3077.766824] kobject: 'queues' (0000000075917ebb): kobject_uevent_env [ 3077.773311] kobject: 'queues' (0000000075917ebb): kobject_uevent_env: filter function caused the event to drop! [ 3077.784536] kobject: 'rx-0' (0000000031b12725): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.793964] kobject: 'rx-0' (0000000031b12725): kobject_uevent_env [ 3077.800342] kobject: 'rx-0' (0000000031b12725): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 3077.810829] kobject: 'tx-0' (0000000075bda2d2): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.820390] kobject: 'tx-0' (0000000075bda2d2): kobject_uevent_env [ 3077.826739] kobject: 'tx-0' (0000000075bda2d2): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 3077.837758] kobject: 'batman_adv' (00000000ff488f2c): kobject_add_internal: parent: 'gretap0', set: '' [ 3077.848186] kobject: 'erspan0' (00000000b2ff92f9): kobject_add_internal: parent: 'net', set: 'devices' [ 3077.858537] kobject: 'erspan0' (00000000b2ff92f9): kobject_uevent_env [ 3077.865682] kobject: 'erspan0' (00000000b2ff92f9): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 3077.875440] kobject: 'queues' (00000000e20115bf): kobject_add_internal: parent: 'erspan0', set: '' [ 3077.885175] kobject: 'queues' (00000000e20115bf): kobject_uevent_env [ 3077.891687] kobject: 'queues' (00000000e20115bf): kobject_uevent_env: filter function caused the event to drop! [ 3077.902304] kobject: 'rx-0' (000000002863aa22): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.911758] kobject: 'rx-0' (000000002863aa22): kobject_uevent_env [ 3077.918177] kobject: 'rx-0' (000000002863aa22): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 3077.928747] kobject: 'tx-0' (00000000429b077c): kobject_add_internal: parent: 'queues', set: 'queues' [ 3077.938295] kobject: 'tx-0' (00000000429b077c): kobject_uevent_env [ 3077.944727] kobject: 'tx-0' (00000000429b077c): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 3077.956052] kobject: 'batman_adv' (00000000ff6ae5c8): kobject_add_internal: parent: 'erspan0', set: '' [ 3077.968536] kobject: 'rx-0' (0000000013ee5aa9): kobject_cleanup, parent 00000000d93a4f3c [ 3077.976786] kobject: 'rx-0' (0000000013ee5aa9): auto cleanup 'remove' event [ 3077.983872] kobject: 'rx-0' (0000000013ee5aa9): kobject_uevent_env [ 3077.990226] kobject: 'rx-0' (0000000013ee5aa9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3078.000304] kobject: 'rx-0' (0000000013ee5aa9): auto cleanup kobject_del [ 3078.007200] kobject: 'rx-0' (0000000013ee5aa9): calling ktype release [ 3078.013798] kobject: 'rx-0': free name [ 3078.017734] kobject: 'tx-0' (00000000d2e9dc8a): kobject_cleanup, parent 00000000d93a4f3c [ 3078.025987] kobject: 'tx-0' (00000000d2e9dc8a): auto cleanup 'remove' event [ 3078.033086] kobject: 'tx-0' (00000000d2e9dc8a): kobject_uevent_env [ 3078.039412] kobject: 'tx-0' (00000000d2e9dc8a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3078.049497] kobject: 'tx-0' (00000000d2e9dc8a): auto cleanup kobject_del [ 3078.056384] kobject: 'tx-0' (00000000d2e9dc8a): calling ktype release [ 3078.062965] kobject: 'tx-0': free name [ 3078.066915] kobject: 'queues' (00000000d93a4f3c): kobject_cleanup, parent (null) [ 3078.075346] kobject: 'queues' (00000000d93a4f3c): calling ktype release [ 3078.082077] kobject: 'queues' (00000000d93a4f3c): kset_release [ 3078.088079] kobject: 'queues': free name [ 3078.092354] kobject: 'ip6_vti0' (0000000017417be0): kobject_uevent_env [ 3078.099044] kobject: 'ip6_vti0' (0000000017417be0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3078.109785] kobject: 'ip6tnl0' (00000000779ae483): kobject_add_internal: parent: 'net', set: 'devices' [ 3078.120044] kobject: 'ip6tnl0' (00000000779ae483): kobject_uevent_env [ 3078.126711] kobject: 'ip6tnl0' (00000000779ae483): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 3078.136468] kobject: 'queues' (00000000442d4fe2): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 3078.146224] kobject: 'queues' (00000000442d4fe2): kobject_uevent_env [ 3078.152713] kobject: 'queues' (00000000442d4fe2): kobject_uevent_env: filter function caused the event to drop! [ 3078.162979] kobject: 'rx-0' (00000000f21e06e8): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.172383] kobject: 'rx-0' (00000000f21e06e8): kobject_uevent_env [ 3078.178750] kobject: 'rx-0' (00000000f21e06e8): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 3078.189215] kobject: 'tx-0' (00000000b8e0e649): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.198778] kobject: 'tx-0' (00000000b8e0e649): kobject_uevent_env [ 3078.205319] kobject: 'tx-0' (00000000b8e0e649): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 3078.216903] kobject: 'ip_vti0' (00000000c6824c77): kobject_add_internal: parent: 'net', set: 'devices' [ 3078.227778] kobject: 'ip_vti0' (00000000c6824c77): kobject_uevent_env [ 3078.235059] kobject: 'ip_vti0' (00000000c6824c77): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 3078.245782] kobject: 'queues' (0000000028312e0c): kobject_add_internal: parent: 'ip_vti0', set: '' [ 3078.256112] kobject: 'queues' (0000000028312e0c): kobject_uevent_env [ 3078.262590] kobject: 'queues' (0000000028312e0c): kobject_uevent_env: filter function caused the event to drop! [ 3078.273926] kobject: 'rx-0' (000000007cf04e5b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.284016] kobject: 'rx-0' (000000007cf04e5b): kobject_uevent_env [ 3078.291440] kobject: 'rx-0' (000000007cf04e5b): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 3078.302561] kobject: 'tx-0' (00000000fd76eb21): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.313068] kobject: 'tx-0' (00000000fd76eb21): kobject_uevent_env [ 3078.319985] kobject: 'tx-0' (00000000fd76eb21): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 3078.332029] kobject: 'ip6_vti0' (0000000017417be0): kobject_cleanup, parent (null) [ 3078.332259] kobject: 'ip6_vti0' (00000000919ca8dc): kobject_add_internal: parent: 'net', set: 'devices' [ 3078.350322] kobject: 'ip6_vti0' (0000000017417be0): auto cleanup 'remove' event [ 3078.354093] kobject: 'ip6_vti0' (00000000919ca8dc): kobject_uevent_env [ 3078.358063] kobject: 'ip6_vti0' (0000000017417be0): kobject_uevent_env [ 3078.367300] kobject: 'ip6_vti0' (00000000919ca8dc): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 3078.371245] kobject: 'ip6_vti0' (0000000017417be0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3078.381060] kobject: 'queues' (000000005d6a8b09): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 3078.392041] kobject: 'ip6_vti0' (0000000017417be0): calling ktype release [ 3078.403764] kobject: 'queues' (000000005d6a8b09): kobject_uevent_env [ 3078.408269] kobject: 'ip6_vti0': free name [ 3078.417184] kobject: 'queues' (000000005d6a8b09): kobject_uevent_env: filter function caused the event to drop! [ 3078.429851] kobject: 'rx-0' (000000009203ebba): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.439344] kobject: 'rx-0' (000000009203ebba): kobject_uevent_env [ 3078.445739] kobject: 'rx-0' (000000009203ebba): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 3078.456345] kobject: 'tx-0' (000000009903bdfa): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.465952] kobject: 'tx-0' (000000009903bdfa): kobject_uevent_env [ 3078.472295] kobject: 'tx-0' (000000009903bdfa): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 3078.483623] kobject: 'ip6gre0' (00000000c69475d0): kobject_add_internal: parent: 'net', set: 'devices' [ 3078.495102] kobject: 'ip6gre0' (00000000c69475d0): kobject_uevent_env [ 3078.501729] kobject: 'ip6gre0' (00000000c69475d0): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 3078.512636] kobject: 'queues' (0000000092ebabc8): kobject_add_internal: parent: 'ip6gre0', set: '' [ 3078.522313] kobject: 'queues' (0000000092ebabc8): kobject_uevent_env [ 3078.528838] kobject: 'queues' (0000000092ebabc8): kobject_uevent_env: filter function caused the event to drop! [ 3078.539117] kobject: 'rx-0' (000000009ef171c7): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.548537] kobject: 'rx-0' (000000009ef171c7): kobject_uevent_env [ 3078.554915] kobject: 'rx-0' (000000009ef171c7): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 3078.565457] kobject: 'tx-0' (00000000b777f084): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.575026] kobject: 'tx-0' (00000000b777f084): kobject_uevent_env [ 3078.581361] kobject: 'tx-0' (00000000b777f084): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 3078.595922] kobject: 'rx-0' (00000000a689254e): kobject_cleanup, parent 00000000d4e2c017 [ 3078.604201] kobject: 'rx-0' (00000000a689254e): auto cleanup 'remove' event [ 3078.611283] kobject: 'rx-0' (00000000a689254e): kobject_uevent_env [ 3078.617661] kobject: 'rx-0' (00000000a689254e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3078.628507] kobject: 'rx-0' (00000000a689254e): auto cleanup kobject_del [ 3078.637257] kobject: 'rx-0' (00000000a689254e): calling ktype release [ 3078.643821] kobject: 'rx-0': free name [ 3078.647773] kobject: 'tx-0' (00000000c4a3cadf): kobject_cleanup, parent 00000000d4e2c017 [ 3078.656076] kobject: 'tx-0' (00000000c4a3cadf): auto cleanup 'remove' event [ 3078.663167] kobject: 'tx-0' (00000000c4a3cadf): kobject_uevent_env [ 3078.669530] kobject: 'tx-0' (00000000c4a3cadf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3078.679595] kobject: 'tx-0' (00000000c4a3cadf): auto cleanup kobject_del [ 3078.686554] kobject: 'tx-0' (00000000c4a3cadf): calling ktype release [ 3078.693131] kobject: 'tx-0': free name [ 3078.697074] kobject: 'queues' (00000000d4e2c017): kobject_cleanup, parent (null) [ 3078.705543] kobject: 'queues' (00000000d4e2c017): calling ktype release [ 3078.712284] kobject: 'queues' (00000000d4e2c017): kset_release [ 3078.718274] kobject: 'queues': free name [ 3078.722559] kobject: 'ip_vti0' (00000000bbb43139): kobject_uevent_env [ 3078.729158] kobject: 'ip_vti0' (00000000bbb43139): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3078.739782] kobject: 'sit0' (00000000e9cdf889): kobject_add_internal: parent: 'net', set: 'devices' [ 3078.750110] kobject: 'sit0' (00000000e9cdf889): kobject_uevent_env [ 3078.756545] kobject: 'sit0' (00000000e9cdf889): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 3078.765770] kobject: 'queues' (000000002e9dbbfa): kobject_add_internal: parent: 'sit0', set: '' [ 3078.775190] kobject: 'queues' (000000002e9dbbfa): kobject_uevent_env [ 3078.781719] kobject: 'queues' (000000002e9dbbfa): kobject_uevent_env: filter function caused the event to drop! [ 3078.791977] kobject: 'rx-0' (0000000053058b34): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.801377] kobject: 'rx-0' (0000000053058b34): kobject_uevent_env [ 3078.807745] kobject: 'rx-0' (0000000053058b34): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 3078.817947] kobject: 'tx-0' (00000000b3a8fe6a): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.827572] kobject: 'tx-0' (00000000b3a8fe6a): kobject_uevent_env [ 3078.833891] kobject: 'tx-0' (00000000b3a8fe6a): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 3078.845321] kobject: 'syz_tun' (00000000052d9fe1): kobject_add_internal: parent: 'net', set: 'devices' [ 3078.856170] kobject: 'syz_tun' (00000000052d9fe1): kobject_uevent_env [ 3078.862775] kobject: 'syz_tun' (00000000052d9fe1): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 3078.872795] kobject: 'queues' (000000002d6409e6): kobject_add_internal: parent: 'syz_tun', set: '' [ 3078.883814] kobject: 'queues' (000000002d6409e6): kobject_uevent_env [ 3078.890692] kobject: 'queues' (000000002d6409e6): kobject_uevent_env: filter function caused the event to drop! [ 3078.902225] kobject: 'rx-0' (000000003da4f345): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.912121] kobject: 'rx-0' (000000003da4f345): kobject_uevent_env [ 3078.919776] kobject: 'rx-0' (000000003da4f345): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 3078.930598] kobject: 'tx-0' (0000000092e1adc0): kobject_add_internal: parent: 'queues', set: 'queues' [ 3078.941316] kobject: 'tx-0' (0000000092e1adc0): kobject_uevent_env [ 3078.947697] kobject: 'tx-0' (0000000092e1adc0): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 3078.958892] kobject: 'batman_adv' (00000000f910e91e): kobject_add_internal: parent: 'syz_tun', set: '' [ 3078.969218] kobject: 'ip_vti0' (00000000bbb43139): kobject_cleanup, parent (null) [ 3078.973721] kobject: 'ip6gretap0' (0000000083b1dd9e): kobject_add_internal: parent: 'net', set: 'devices' [ 3078.988500] kobject: 'ip6gretap0' (0000000083b1dd9e): kobject_uevent_env [ 3078.995697] kobject: 'ip6gretap0' (0000000083b1dd9e): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 3078.997940] kobject: 'ip_vti0' (00000000bbb43139): auto cleanup 'remove' event [ 3079.006041] kobject: 'queues' (00000000cdabd0a3): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 3079.015999] kobject: 'ip_vti0' (00000000bbb43139): kobject_uevent_env [ 3079.023616] kobject: 'queues' (00000000cdabd0a3): kobject_uevent_env [ 3079.036394] kobject: 'ip_vti0' (00000000bbb43139): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3079.036542] kobject: 'queues' (00000000cdabd0a3): kobject_uevent_env: filter function caused the event to drop! [ 3079.049536] kobject: 'ip_vti0' (00000000bbb43139): calling ktype release [ 3079.057139] kobject: 'rx-0' (000000001597eb5b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.063918] kobject: 'ip_vti0': free name [ 3079.076050] kobject: 'rx-0' (000000001597eb5b): kobject_uevent_env [ 3079.084324] kobject: 'rx-0' (000000001597eb5b): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 3079.095338] kobject: 'tx-0' (00000000f82876d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.104935] kobject: 'tx-0' (00000000f82876d8): kobject_uevent_env [ 3079.111264] kobject: 'tx-0' (00000000f82876d8): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 3079.122538] kobject: 'batman_adv' (000000002a89f8f8): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 3079.133136] kobject: 'ip6tnl0' (00000000da17a758): kobject_add_internal: parent: 'net', set: 'devices' [ 3079.143711] kobject: 'ip6tnl0' (00000000da17a758): kobject_uevent_env [ 3079.150361] kobject: 'ip6tnl0' (00000000da17a758): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 3079.160059] kobject: 'queues' (00000000b6b0a16f): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 3079.169712] kobject: 'queues' (00000000b6b0a16f): kobject_uevent_env [ 3079.176220] kobject: 'queues' (00000000b6b0a16f): kobject_uevent_env: filter function caused the event to drop! [ 3079.186565] kobject: 'rx-0' (00000000e5d99084): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.196002] kobject: 'rx-0' (00000000e5d99084): kobject_uevent_env [ 3079.202323] kobject: 'rx-0' (00000000e5d99084): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 3079.212816] kobject: 'tx-0' (00000000408300bd): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.222275] kobject: 'tx-0' (00000000408300bd): kobject_uevent_env [ 3079.228664] kobject: 'tx-0' (00000000408300bd): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 3079.240057] kobject: 'ip6gre0' (0000000072d99a6e): kobject_add_internal: parent: 'net', set: 'devices' [ 3079.250293] kobject: 'ip6gre0' (0000000072d99a6e): kobject_uevent_env [ 3079.256952] kobject: 'ip6gre0' (0000000072d99a6e): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 3079.266651] kobject: 'queues' (000000000654b25c): kobject_add_internal: parent: 'ip6gre0', set: '' [ 3079.276329] kobject: 'queues' (000000000654b25c): kobject_uevent_env [ 3079.282824] kobject: 'queues' (000000000654b25c): kobject_uevent_env: filter function caused the event to drop! [ 3079.293080] kobject: 'rx-0' (00000000f2393dd0): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.302527] kobject: 'rx-0' (00000000f2393dd0): kobject_uevent_env [ 3079.308894] kobject: 'rx-0' (00000000f2393dd0): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 3079.319377] kobject: 'tx-0' (00000000a81e9caf): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.328942] kobject: 'tx-0' (00000000a81e9caf): kobject_uevent_env [ 3079.335328] kobject: 'tx-0' (00000000a81e9caf): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 3079.349096] kobject: 'batman_adv' (000000002dc1b35a): kobject_uevent_env [ 3079.355987] kobject: 'batman_adv' (000000002dc1b35a): kobject_uevent_env: filter function caused the event to drop! [ 3079.366650] kobject: 'batman_adv' (000000002dc1b35a): kobject_cleanup, parent (null) [ 3079.375417] kobject: 'batman_adv' (000000002dc1b35a): calling ktype release [ 3079.382503] kobject: (000000002dc1b35a): dynamic_kobj_release [ 3079.388424] kobject: 'batman_adv': free name [ 3079.392938] kobject: 'rx-0' (00000000ad7f687b): kobject_cleanup, parent 00000000542cca22 [ 3079.401188] kobject: 'rx-0' (00000000ad7f687b): auto cleanup 'remove' event [ 3079.408304] kobject: 'rx-0' (00000000ad7f687b): kobject_uevent_env [ 3079.414667] kobject: 'rx-0' (00000000ad7f687b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3079.424820] kobject: 'rx-0' (00000000ad7f687b): auto cleanup kobject_del [ 3079.431671] kobject: 'rx-0' (00000000ad7f687b): calling ktype release [ 3079.438274] kobject: 'rx-0': free name [ 3079.442205] kobject: 'tx-0' (00000000813029a9): kobject_cleanup, parent 00000000542cca22 [ 3079.450477] kobject: 'tx-0' (00000000813029a9): auto cleanup 'remove' event [ 3079.457617] kobject: 'tx-0' (00000000813029a9): kobject_uevent_env [ 3079.463915] kobject: 'tx-0' (00000000813029a9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3079.473977] kobject: 'tx-0' (00000000813029a9): auto cleanup kobject_del [ 3079.480863] kobject: 'tx-0' (00000000813029a9): calling ktype release [ 3079.487472] kobject: 'tx-0': free name [ 3079.491426] kobject: 'queues' (00000000542cca22): kobject_cleanup, parent (null) [ 3079.499843] kobject: 'queues' (00000000542cca22): calling ktype release [ 3079.506626] kobject: 'queues' (00000000542cca22): kset_release [ 3079.512577] kobject: 'queues': free name [ 3079.516984] kobject: 'erspan0' (000000002556f503): kobject_uevent_env [ 3079.523581] kobject: 'erspan0' (000000002556f503): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3079.534624] kobject: 'bridge0' (000000005d47e40e): kobject_add_internal: parent: 'net', set: 'devices' [ 3079.545376] kobject: 'bridge0' (000000005d47e40e): kobject_uevent_env [ 3079.551976] kobject: 'bridge0' (000000005d47e40e): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 3079.561733] kobject: 'queues' (00000000ec0fcc24): kobject_add_internal: parent: 'bridge0', set: '' [ 3079.571381] kobject: 'queues' (00000000ec0fcc24): kobject_uevent_env [ 3079.577916] kobject: 'queues' (00000000ec0fcc24): kobject_uevent_env: filter function caused the event to drop! [ 3079.588180] kobject: 'rx-0' (00000000a3e6aa85): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.597625] kobject: 'rx-0' (00000000a3e6aa85): kobject_uevent_env [ 3079.603965] kobject: 'rx-0' (00000000a3e6aa85): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 3079.614461] kobject: 'tx-0' (00000000b0d52c50): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.623935] kobject: 'tx-0' (00000000b0d52c50): kobject_uevent_env [ 3079.630314] kobject: 'tx-0' (00000000b0d52c50): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 3079.641552] kobject: 'brif' (0000000022442eb3): kobject_add_internal: parent: 'bridge0', set: '' [ 3079.651232] kobject: 'batman_adv' (000000006e3ae705): kobject_add_internal: parent: 'bridge0', set: '' [ 3079.661901] kobject: 'syz_tun' (0000000091d74232): kobject_add_internal: parent: 'net', set: 'devices' [ 3079.672349] kobject: 'syz_tun' (0000000091d74232): kobject_uevent_env [ 3079.679164] kobject: 'syz_tun' (0000000091d74232): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 3079.688932] kobject: 'queues' (000000001cb14418): kobject_add_internal: parent: 'syz_tun', set: '' [ 3079.698594] kobject: 'queues' (000000001cb14418): kobject_uevent_env [ 3079.706617] kobject: 'queues' (000000001cb14418): kobject_uevent_env: filter function caused the event to drop! [ 3079.716896] kobject: 'rx-0' (00000000c76513e3): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.726311] kobject: 'rx-0' (00000000c76513e3): kobject_uevent_env [ 3079.732624] kobject: 'rx-0' (00000000c76513e3): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 3079.743133] kobject: 'tx-0' (000000005c3db0b9): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.752623] kobject: 'tx-0' (000000005c3db0b9): kobject_uevent_env [ 3079.758983] kobject: 'tx-0' (000000005c3db0b9): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 3079.770181] kobject: 'batman_adv' (00000000513fd4ee): kobject_add_internal: parent: 'syz_tun', set: '' [ 3079.780519] kobject: 'erspan0' (000000002556f503): kobject_cleanup, parent (null) [ 3079.784825] kobject: 'ip6gretap0' (00000000f3cd85e5): kobject_add_internal: parent: 'net', set: 'devices' [ 3079.798837] kobject: 'erspan0' (000000002556f503): auto cleanup 'remove' event [ 3079.802161] kobject: 'ip6gretap0' (00000000f3cd85e5): kobject_uevent_env [ 3079.813313] kobject: 'ip6gretap0' (00000000f3cd85e5): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 3079.814231] kobject: 'erspan0' (000000002556f503): kobject_uevent_env [ 3079.826547] kobject: 'queues' (000000001d222e78): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 3079.840078] kobject: 'erspan0' (000000002556f503): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3079.843190] kobject: 'queues' (000000001d222e78): kobject_uevent_env [ 3079.850469] kobject: 'erspan0' (000000002556f503): calling ktype release [ 3079.859813] kobject: 'queues' (000000001d222e78): kobject_uevent_env: filter function caused the event to drop! [ 3079.863854] kobject: 'erspan0': free name [ 3079.874325] kobject: 'rx-0' (0000000065a716ab): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.887750] kobject: 'rx-0' (0000000065a716ab): kobject_uevent_env [ 3079.894254] kobject: 'rx-0' (0000000065a716ab): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 3079.905041] kobject: 'tx-0' (00000000b1a10417): kobject_add_internal: parent: 'queues', set: 'queues' [ 3079.914536] kobject: 'tx-0' (00000000b1a10417): kobject_uevent_env [ 3079.920868] kobject: 'tx-0' (00000000b1a10417): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 3079.932272] kobject: 'batman_adv' (00000000d18f5117): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 3079.942976] kobject: 'vcan0' (00000000bd919d0b): kobject_add_internal: parent: 'net', set: 'devices' [ 3079.953195] kobject: 'vcan0' (00000000bd919d0b): kobject_uevent_env [ 3079.959706] kobject: 'vcan0' (00000000bd919d0b): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 3079.969170] kobject: 'queues' (0000000033f47569): kobject_add_internal: parent: 'vcan0', set: '' [ 3079.978654] kobject: 'queues' (0000000033f47569): kobject_uevent_env [ 3079.985173] kobject: 'queues' (0000000033f47569): kobject_uevent_env: filter function caused the event to drop! [ 3079.995482] kobject: 'rx-0' (00000000081ec391): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.004932] kobject: 'rx-0' (00000000081ec391): kobject_uevent_env [ 3080.011273] kobject: 'rx-0' (00000000081ec391): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 3080.021625] kobject: 'tx-0' (00000000c7429241): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.031832] kobject: 'tx-0' (00000000c7429241): kobject_uevent_env [ 3080.038503] kobject: 'tx-0' (00000000c7429241): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 3080.051819] kobject: 'batman_adv' (00000000bf2faa4b): kobject_uevent_env [ 3080.058682] kobject: 'batman_adv' (00000000bf2faa4b): kobject_uevent_env: filter function caused the event to drop! [ 3080.069321] kobject: 'batman_adv' (00000000bf2faa4b): kobject_cleanup, parent (null) [ 3080.078180] kobject: 'batman_adv' (00000000bf2faa4b): calling ktype release [ 3080.085351] kobject: (00000000bf2faa4b): dynamic_kobj_release [ 3080.091238] kobject: 'batman_adv': free name [ 3080.095799] kobject: 'rx-0' (000000000e3f2cb2): kobject_cleanup, parent 00000000966daa05 [ 3080.104023] kobject: 'rx-0' (000000000e3f2cb2): auto cleanup 'remove' event [ 3080.111142] kobject: 'rx-0' (000000000e3f2cb2): kobject_uevent_env [ 3080.117479] kobject: 'rx-0' (000000000e3f2cb2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3080.127577] kobject: 'rx-0' (000000000e3f2cb2): auto cleanup kobject_del [ 3080.134508] kobject: 'rx-0' (000000000e3f2cb2): calling ktype release [ 3080.141094] kobject: 'rx-0': free name [ 3080.145063] kobject: 'tx-0' (00000000ad276ed3): kobject_cleanup, parent 00000000966daa05 [ 3080.153285] kobject: 'tx-0' (00000000ad276ed3): auto cleanup 'remove' event [ 3080.160405] kobject: 'tx-0' (00000000ad276ed3): kobject_uevent_env [ 3080.166953] kobject: 'tx-0' (00000000ad276ed3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3080.177043] kobject: 'tx-0' (00000000ad276ed3): auto cleanup kobject_del [ 3080.183917] kobject: 'tx-0' (00000000ad276ed3): calling ktype release [ 3080.190542] kobject: 'tx-0': free name [ 3080.194508] kobject: 'queues' (00000000966daa05): kobject_cleanup, parent (null) [ 3080.202901] kobject: 'queues' (00000000966daa05): calling ktype release [ 3080.209677] kobject: 'queues' (00000000966daa05): kset_release [ 3080.215683] kobject: 'queues': free name [ 3080.220003] kobject: 'gretap0' (00000000ef880161): kobject_uevent_env [ 3080.226622] kobject: 'gretap0' (00000000ef880161): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3080.237397] kobject: 'bridge0' (00000000b3408c8f): kobject_add_internal: parent: 'net', set: 'devices' [ 3080.247809] kobject: 'bridge0' (00000000b3408c8f): kobject_uevent_env [ 3080.254464] kobject: 'bridge0' (00000000b3408c8f): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 3080.264247] kobject: 'queues' (00000000b75eb117): kobject_add_internal: parent: 'bridge0', set: '' [ 3080.273893] kobject: 'queues' (00000000b75eb117): kobject_uevent_env [ 3080.280442] kobject: 'queues' (00000000b75eb117): kobject_uevent_env: filter function caused the event to drop! [ 3080.290711] kobject: 'rx-0' (0000000011c9d11d): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.300142] kobject: 'rx-0' (0000000011c9d11d): kobject_uevent_env [ 3080.306533] kobject: 'rx-0' (0000000011c9d11d): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 3080.317070] kobject: 'tx-0' (000000006ef4a322): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.326664] kobject: 'tx-0' (000000006ef4a322): kobject_uevent_env [ 3080.333013] kobject: 'tx-0' (000000006ef4a322): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 3080.344641] kobject: 'brif' (00000000386f7333): kobject_add_internal: parent: 'bridge0', set: '' [ 3080.355623] kobject: 'batman_adv' (00000000fc3df04d): kobject_add_internal: parent: 'bridge0', set: '' [ 3080.366442] kobject: 'bond0' (000000001d27fd7a): kobject_add_internal: parent: 'net', set: 'devices' [ 3080.376542] kobject: 'bond0' (000000001d27fd7a): kobject_uevent_env [ 3080.382953] kobject: 'bond0' (000000001d27fd7a): fill_kobj_path: path = '/devices/virtual/net/bond0' [ 3080.392364] kobject: 'queues' (00000000783ba954): kobject_add_internal: parent: 'bond0', set: '' [ 3080.401861] kobject: 'queues' (00000000783ba954): kobject_uevent_env [ 3080.408380] kobject: 'queues' (00000000783ba954): kobject_uevent_env: filter function caused the event to drop! [ 3080.418631] kobject: 'rx-0' (000000003a0c0760): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.428321] kobject: 'rx-0' (000000003a0c0760): kobject_uevent_env [ 3080.434726] kobject: 'rx-0' (000000003a0c0760): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-0' [ 3080.445034] kobject: 'rx-1' (00000000787665e0): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.454464] kobject: 'rx-1' (00000000787665e0): kobject_uevent_env [ 3080.460813] kobject: 'rx-1' (00000000787665e0): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-1' [ 3080.471148] kobject: 'rx-2' (0000000042ba5454): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.480565] kobject: 'rx-2' (0000000042ba5454): kobject_uevent_env [ 3080.486936] kobject: 'rx-2' (0000000042ba5454): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-2' [ 3080.497232] kobject: 'rx-3' (00000000094b74a7): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.506680] kobject: 'rx-3' (00000000094b74a7): kobject_uevent_env [ 3080.513016] kobject: 'rx-3' (00000000094b74a7): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-3' [ 3080.523349] kobject: 'rx-4' (000000006c881198): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.532769] kobject: 'rx-4' (000000006c881198): kobject_uevent_env [ 3080.539163] kobject: 'rx-4' (000000006c881198): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-4' [ 3080.549476] kobject: 'rx-5' (0000000073ea1f09): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.559186] kobject: 'rx-5' (0000000073ea1f09): kobject_uevent_env [ 3080.565586] kobject: 'rx-5' (0000000073ea1f09): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-5' [ 3080.575892] kobject: 'rx-6' (000000005406f6bd): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.585412] kobject: 'rx-6' (000000005406f6bd): kobject_uevent_env [ 3080.591744] kobject: 'rx-6' (000000005406f6bd): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-6' [ 3080.602071] kobject: 'rx-7' (000000006d6e5526): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.611476] kobject: 'rx-7' (000000006d6e5526): kobject_uevent_env [ 3080.617867] kobject: 'rx-7' (000000006d6e5526): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-7' [ 3080.628187] kobject: 'rx-8' (000000009047ab7b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.637636] kobject: 'rx-8' (000000009047ab7b): kobject_uevent_env [ 3080.643985] kobject: 'rx-8' (000000009047ab7b): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-8' [ 3080.654313] kobject: 'rx-9' (00000000060db223): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.663700] kobject: 'rx-9' (00000000060db223): kobject_uevent_env [ 3080.670101] kobject: 'rx-9' (00000000060db223): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-9' [ 3080.680392] kobject: 'rx-10' (000000005e82f6c7): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.690181] kobject: 'rx-10' (000000005e82f6c7): kobject_uevent_env [ 3080.696654] kobject: 'rx-10' (000000005e82f6c7): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-10' [ 3080.707142] kobject: 'rx-11' (00000000e8dc69c1): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.716672] kobject: 'rx-11' (00000000e8dc69c1): kobject_uevent_env [ 3080.723090] kobject: 'rx-11' (00000000e8dc69c1): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-11' [ 3080.733607] kobject: 'rx-12' (0000000004cfc8e4): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.743107] kobject: 'rx-12' (0000000004cfc8e4): kobject_uevent_env [ 3080.749764] kobject: 'rx-12' (0000000004cfc8e4): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-12' [ 3080.760310] kobject: 'rx-13' (00000000384aaa29): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.769828] kobject: 'rx-13' (00000000384aaa29): kobject_uevent_env [ 3080.776304] kobject: 'rx-13' (00000000384aaa29): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-13' [ 3080.786804] kobject: 'rx-14' (000000007e856f30): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.796348] kobject: 'rx-14' (000000007e856f30): kobject_uevent_env [ 3080.802788] kobject: 'rx-14' (000000007e856f30): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-14' [ 3080.814747] kobject: 'rx-15' (00000000eaf5ebd9): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.824299] kobject: 'rx-15' (00000000eaf5ebd9): kobject_uevent_env [ 3080.830705] kobject: 'rx-15' (00000000eaf5ebd9): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-15' [ 3080.841207] kobject: 'tx-0' (0000000078094528): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.850782] kobject: 'tx-0' (0000000078094528): kobject_uevent_env [ 3080.857129] kobject: 'tx-0' (0000000078094528): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-0' [ 3080.867465] kobject: 'tx-1' (000000000fc6bddc): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.877039] kobject: 'tx-1' (000000000fc6bddc): kobject_uevent_env [ 3080.883354] kobject: 'tx-1' (000000000fc6bddc): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-1' [ 3080.893757] kobject: 'tx-2' (000000008ee3dd15): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.903249] kobject: 'tx-2' (000000008ee3dd15): kobject_uevent_env [ 3080.909610] kobject: 'tx-2' (000000008ee3dd15): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-2' [ 3080.919915] kobject: 'tx-3' (00000000f912657c): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.929450] kobject: 'tx-3' (00000000f912657c): kobject_uevent_env [ 3080.935824] kobject: 'tx-3' (00000000f912657c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-3' [ 3080.946623] kobject: 'tx-4' (000000009121e5a1): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.956312] kobject: 'tx-4' (000000009121e5a1): kobject_uevent_env [ 3080.962644] kobject: 'tx-4' (000000009121e5a1): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-4' [ 3080.972958] kobject: 'tx-5' (000000007746c4fd): kobject_add_internal: parent: 'queues', set: 'queues' [ 3080.982629] kobject: 'tx-5' (000000007746c4fd): kobject_uevent_env [ 3080.990230] kobject: 'tx-5' (000000007746c4fd): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-5' [ 3081.000599] kobject: 'tx-6' (00000000ff8ba8a8): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.010064] kobject: 'tx-6' (00000000ff8ba8a8): kobject_uevent_env [ 3081.016443] kobject: 'tx-6' (00000000ff8ba8a8): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-6' [ 3081.026736] kobject: 'tx-7' (00000000592f6321): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.036423] kobject: 'tx-7' (00000000592f6321): kobject_uevent_env [ 3081.042744] kobject: 'tx-7' (00000000592f6321): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-7' [ 3081.053074] kobject: 'tx-8' (0000000029f5deb7): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.062565] kobject: 'tx-8' (0000000029f5deb7): kobject_uevent_env [ 3081.069040] kobject: 'tx-8' (0000000029f5deb7): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-8' [ 3081.079668] kobject: 'tx-9' (000000005e7c1efa): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.089329] kobject: 'tx-9' (000000005e7c1efa): kobject_uevent_env [ 3081.095699] kobject: 'tx-9' (000000005e7c1efa): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-9' [ 3081.106014] kobject: 'tx-10' (00000000839e9601): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.115677] kobject: 'tx-10' (00000000839e9601): kobject_uevent_env [ 3081.122126] kobject: 'tx-10' (00000000839e9601): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-10' [ 3081.132621] kobject: 'tx-11' (0000000085fb0c32): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.142194] kobject: 'tx-11' (0000000085fb0c32): kobject_uevent_env [ 3081.148656] kobject: 'tx-11' (0000000085fb0c32): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-11' [ 3081.159127] kobject: 'tx-12' (00000000124b9909): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.168757] kobject: 'tx-12' (00000000124b9909): kobject_uevent_env [ 3081.175243] kobject: 'tx-12' (00000000124b9909): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-12' [ 3081.185785] kobject: 'tx-13' (00000000175c2925): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.195386] kobject: 'tx-13' (00000000175c2925): kobject_uevent_env [ 3081.201794] kobject: 'tx-13' (00000000175c2925): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-13' [ 3081.212604] kobject: 'tx-14' (00000000b91e16ee): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.222279] kobject: 'tx-14' (00000000b91e16ee): kobject_uevent_env [ 3081.228714] kobject: 'tx-14' (00000000b91e16ee): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-14' [ 3081.239214] kobject: 'tx-15' (000000002f2e4006): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.248771] kobject: 'tx-15' (000000002f2e4006): kobject_uevent_env [ 3081.255233] kobject: 'tx-15' (000000002f2e4006): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-15' [ 3081.266368] kobject: 'batman_adv' (000000004663041e): kobject_add_internal: parent: 'bond0', set: '' [ 3081.276678] kobject: 'gretap0' (00000000ef880161): kobject_cleanup, parent (null) [ 3081.277248] kobject: 'team0' (00000000586bbd2a): kobject_add_internal: parent: 'net', set: 'devices' [ 3081.295387] kobject: 'team0' (00000000586bbd2a): kobject_uevent_env [ 3081.296785] kobject: 'gretap0' (00000000ef880161): auto cleanup 'remove' event [ 3081.301822] kobject: 'team0' (00000000586bbd2a): fill_kobj_path: path = '/devices/virtual/net/team0' [ 3081.318614] kobject: 'queues' (00000000a0b60259): kobject_add_internal: parent: 'team0', set: '' [ 3081.326831] kobject: 'gretap0' (00000000ef880161): kobject_uevent_env [ 3081.328312] kobject: 'queues' (00000000a0b60259): kobject_uevent_env [ 3081.341187] kobject: 'gretap0' (00000000ef880161): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3081.341610] kobject: 'queues' (00000000a0b60259): kobject_uevent_env: filter function caused the event to drop! [ 3081.351535] kobject: 'gretap0' (00000000ef880161): calling ktype release [ 3081.362371] kobject: 'rx-0' (00000000ce15d144): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.371254] kobject: 'gretap0': free name [ 3081.378281] kobject: 'rx-0' (00000000ce15d144): kobject_uevent_env [ 3081.388762] kobject: 'rx-0' (00000000ce15d144): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-0' [ 3081.399130] kobject: 'rx-1' (000000007e0c399a): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.408553] kobject: 'rx-1' (000000007e0c399a): kobject_uevent_env [ 3081.414946] kobject: 'rx-1' (000000007e0c399a): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-1' [ 3081.425235] kobject: 'rx-2' (00000000d92fcb11): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.434696] kobject: 'rx-2' (00000000d92fcb11): kobject_uevent_env [ 3081.441042] kobject: 'rx-2' (00000000d92fcb11): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-2' [ 3081.451376] kobject: 'rx-3' (00000000ac758b3d): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.460785] kobject: 'rx-3' (00000000ac758b3d): kobject_uevent_env [ 3081.467565] kobject: 'rx-3' (00000000ac758b3d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-3' [ 3081.477915] kobject: 'rx-4' (00000000b481750e): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.487345] kobject: 'rx-4' (00000000b481750e): kobject_uevent_env [ 3081.493667] kobject: 'rx-4' (00000000b481750e): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-4' [ 3081.504018] kobject: 'rx-5' (000000007ff96d47): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.513443] kobject: 'rx-5' (000000007ff96d47): kobject_uevent_env [ 3081.519820] kobject: 'rx-5' (000000007ff96d47): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-5' [ 3081.530229] kobject: 'rx-6' (000000008f3c701a): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.539710] kobject: 'rx-6' (000000008f3c701a): kobject_uevent_env [ 3081.546781] kobject: 'rx-6' (000000008f3c701a): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-6' [ 3081.557184] kobject: 'rx-7' (0000000047d5628c): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.566638] kobject: 'rx-7' (0000000047d5628c): kobject_uevent_env [ 3081.572972] kobject: 'rx-7' (0000000047d5628c): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-7' [ 3081.583347] kobject: 'rx-8' (0000000014fd0f86): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.592755] kobject: 'rx-8' (0000000014fd0f86): kobject_uevent_env [ 3081.599392] kobject: 'rx-8' (0000000014fd0f86): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-8' [ 3081.609717] kobject: 'rx-9' (00000000cc9c3059): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.619140] kobject: 'rx-9' (00000000cc9c3059): kobject_uevent_env [ 3081.629682] kobject: 'rx-9' (00000000cc9c3059): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-9' [ 3081.640063] kobject: 'rx-10' (00000000954f74b6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.649589] kobject: 'rx-10' (00000000954f74b6): kobject_uevent_env [ 3081.656064] kobject: 'rx-10' (00000000954f74b6): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-10' [ 3081.666562] kobject: 'rx-11' (00000000b0db7c91): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.676085] kobject: 'rx-11' (00000000b0db7c91): kobject_uevent_env [ 3081.682512] kobject: 'rx-11' (00000000b0db7c91): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-11' [ 3081.693000] kobject: 'rx-12' (00000000161170e0): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.702526] kobject: 'rx-12' (00000000161170e0): kobject_uevent_env [ 3081.708975] kobject: 'rx-12' (00000000161170e0): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-12' [ 3081.719465] kobject: 'rx-13' (00000000554839f7): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.729271] kobject: 'rx-13' (00000000554839f7): kobject_uevent_env [ 3081.735752] kobject: 'rx-13' (00000000554839f7): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-13' [ 3081.746261] kobject: 'rx-14' (00000000aa6e066f): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.755787] kobject: 'rx-14' (00000000aa6e066f): kobject_uevent_env [ 3081.762208] kobject: 'rx-14' (00000000aa6e066f): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-14' [ 3081.772712] kobject: 'rx-15' (00000000ff203029): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.782237] kobject: 'rx-15' (00000000ff203029): kobject_uevent_env [ 3081.788697] kobject: 'rx-15' (00000000ff203029): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-15' [ 3081.799206] kobject: 'tx-0' (00000000e6920e31): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.808768] kobject: 'tx-0' (00000000e6920e31): kobject_uevent_env [ 3081.815138] kobject: 'tx-0' (00000000e6920e31): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-0' [ 3081.825504] kobject: 'tx-1' (0000000078a9896b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.835004] kobject: 'tx-1' (0000000078a9896b): kobject_uevent_env [ 3081.841319] kobject: 'tx-1' (0000000078a9896b): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-1' [ 3081.851639] kobject: 'tx-2' (000000000c64aeb6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.861331] kobject: 'tx-2' (000000000c64aeb6): kobject_uevent_env [ 3081.867709] kobject: 'tx-2' (000000000c64aeb6): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-2' [ 3081.878010] kobject: 'tx-3' (00000000774b8fe7): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.887604] kobject: 'tx-3' (00000000774b8fe7): kobject_uevent_env [ 3081.893927] kobject: 'tx-3' (00000000774b8fe7): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-3' [ 3081.904281] kobject: 'tx-4' (00000000e3fa3890): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.913729] kobject: 'tx-4' (00000000e3fa3890): kobject_uevent_env [ 3081.920089] kobject: 'tx-4' (00000000e3fa3890): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-4' [ 3081.930427] kobject: 'tx-5' (000000008d656722): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.939971] kobject: 'tx-5' (000000008d656722): kobject_uevent_env [ 3081.946322] kobject: 'tx-5' (000000008d656722): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-5' [ 3081.956664] kobject: 'tx-6' (000000007af05718): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.966137] kobject: 'tx-6' (000000007af05718): kobject_uevent_env [ 3081.972451] kobject: 'tx-6' (000000007af05718): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-6' [ 3081.982798] kobject: 'tx-7' (0000000031fd76c4): kobject_add_internal: parent: 'queues', set: 'queues' [ 3081.992458] kobject: 'tx-7' (0000000031fd76c4): kobject_uevent_env [ 3081.998852] kobject: 'tx-7' (0000000031fd76c4): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-7' [ 3082.009144] kobject: 'tx-8' (00000000128cb9fe): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.018696] kobject: 'tx-8' (00000000128cb9fe): kobject_uevent_env [ 3082.025043] kobject: 'tx-8' (00000000128cb9fe): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-8' [ 3082.035415] kobject: 'tx-9' (00000000d8e2d31b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.044876] kobject: 'tx-9' (00000000d8e2d31b): kobject_uevent_env [ 3082.051187] kobject: 'tx-9' (00000000d8e2d31b): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-9' [ 3082.061515] kobject: 'tx-10' (0000000070121f1e): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.071096] kobject: 'tx-10' (0000000070121f1e): kobject_uevent_env [ 3082.077555] kobject: 'tx-10' (0000000070121f1e): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-10' [ 3082.088050] kobject: 'tx-11' (00000000807eadd1): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.097720] kobject: 'tx-11' (00000000807eadd1): kobject_uevent_env [ 3082.104126] kobject: 'tx-11' (00000000807eadd1): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-11' [ 3082.115127] kobject: 'tx-12' (000000006621f473): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.124753] kobject: 'tx-12' (000000006621f473): kobject_uevent_env [ 3082.131166] kobject: 'tx-12' (000000006621f473): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-12' [ 3082.141674] kobject: 'tx-13' (000000005a716757): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.151224] kobject: 'tx-13' (000000005a716757): kobject_uevent_env [ 3082.157712] kobject: 'tx-13' (000000005a716757): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-13' [ 3082.168171] kobject: 'tx-14' (000000009a9fb0fe): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.177805] kobject: 'tx-14' (000000009a9fb0fe): kobject_uevent_env [ 3082.184247] kobject: 'tx-14' (000000009a9fb0fe): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-14' [ 3082.194774] kobject: 'tx-15' (00000000b9df0d50): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.204329] kobject: 'tx-15' (00000000b9df0d50): kobject_uevent_env [ 3082.210746] kobject: 'tx-15' (00000000b9df0d50): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-15' [ 3082.221843] kobject: 'batman_adv' (0000000025e25f0b): kobject_add_internal: parent: 'team0', set: '' [ 3082.232113] kobject: 'vcan0' (000000000f175649): kobject_add_internal: parent: 'net', set: 'devices' [ 3082.242458] kobject: 'vcan0' (000000000f175649): kobject_uevent_env [ 3082.248931] kobject: 'vcan0' (000000000f175649): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 3082.258276] kobject: 'queues' (000000009c1e0b76): kobject_add_internal: parent: 'vcan0', set: '' [ 3082.268068] kobject: 'queues' (000000009c1e0b76): kobject_uevent_env [ 3082.274616] kobject: 'queues' (000000009c1e0b76): kobject_uevent_env: filter function caused the event to drop! [ 3082.284912] kobject: 'rx-0' (00000000faf6b6fb): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.294401] kobject: 'rx-0' (00000000faf6b6fb): kobject_uevent_env [ 3082.300739] kobject: 'rx-0' (00000000faf6b6fb): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 3082.311067] kobject: 'tx-0' (00000000dc0e7f9e): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.320560] kobject: 'tx-0' (00000000dc0e7f9e): kobject_uevent_env [ 3082.326934] kobject: 'tx-0' (00000000dc0e7f9e): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 3082.339833] kobject: 'rx-0' (00000000d9381746): kobject_cleanup, parent 00000000ecd83b31 [ 3082.348159] kobject: 'rx-0' (00000000d9381746): auto cleanup 'remove' event [ 3082.355290] kobject: 'rx-0' (00000000d9381746): kobject_uevent_env [ 3082.361599] kobject: 'rx-0' (00000000d9381746): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3082.371679] kobject: 'rx-0' (00000000d9381746): auto cleanup kobject_del [ 3082.378550] kobject: 'rx-0' (00000000d9381746): calling ktype release [ 3082.385162] kobject: 'rx-0': free name [ 3082.389070] kobject: 'tx-0' (0000000016683213): kobject_cleanup, parent 00000000ecd83b31 [ 3082.397310] kobject: 'tx-0' (0000000016683213): auto cleanup 'remove' event [ 3082.404437] kobject: 'tx-0' (0000000016683213): kobject_uevent_env [ 3082.410744] kobject: 'tx-0' (0000000016683213): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3082.420925] kobject: 'tx-0' (0000000016683213): auto cleanup kobject_del [ 3082.427856] kobject: 'tx-0' (0000000016683213): calling ktype release [ 3082.434672] kobject: 'tx-0': free name [ 3082.438564] kobject: 'queues' (00000000ecd83b31): kobject_cleanup, parent (null) [ 3082.446978] kobject: 'queues' (00000000ecd83b31): calling ktype release [ 3082.453727] kobject: 'queues' (00000000ecd83b31): kset_release [ 3082.459717] kobject: 'queues': free name [ 3082.463983] kobject: 'gre0' (00000000244f42c4): kobject_uevent_env [ 3082.470341] kobject: 'gre0' (00000000244f42c4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3082.480744] kobject: 'dummy0' (0000000017664c9d): kobject_add_internal: parent: 'net', set: 'devices' [ 3082.491274] kobject: 'dummy0' (0000000017664c9d): kobject_uevent_env [ 3082.497830] kobject: 'dummy0' (0000000017664c9d): fill_kobj_path: path = '/devices/virtual/net/dummy0' [ 3082.507794] kobject: 'queues' (000000008dcf46f3): kobject_add_internal: parent: 'dummy0', set: '' [ 3082.517381] kobject: 'queues' (000000008dcf46f3): kobject_uevent_env [ 3082.523875] kobject: 'queues' (000000008dcf46f3): kobject_uevent_env: filter function caused the event to drop! [ 3082.534189] kobject: 'rx-0' (00000000ed464b4e): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.543599] kobject: 'rx-0' (00000000ed464b4e): kobject_uevent_env [ 3082.549966] kobject: 'rx-0' (00000000ed464b4e): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/rx-0' [ 3082.560339] kobject: 'tx-0' (000000006b1b0278): kobject_add_internal: parent: 'queues', set: 'queues' [ 3082.569871] kobject: 'tx-0' (000000006b1b0278): kobject_uevent_env [ 3082.576232] kobject: 'tx-0' (000000006b1b0278): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/tx-0'