, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfdffffff, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1842.920983] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1842.932168] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1842.942450] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1842.951009] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:14 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x2300, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:14 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1842.968655] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1842.980298] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1842.992721] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:14 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1843.074190] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:14 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1843.153979] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfffffdfd, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:14 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x6000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1843.225664] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.262577] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.290205] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.323664] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.387843] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.428359] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x7000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:15 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:15 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3f00, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:15 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x7000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:15 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfffffffd, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1843.789189] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.806901] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.809274] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.826648] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x6000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1843.835486] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.852296] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1843.862047] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:15 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x7fffffe, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:15 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1843.972992] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.032934] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x100000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1844.081612] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.084066] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x8800, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1844.139066] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.165438] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x8000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:15 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1844.198789] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:15 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x11000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1844.260323] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.286751] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1844.329862] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.346914] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x1000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1844.392120] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x200000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:16 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1844.435880] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.468081] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x23000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1844.519914] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.558769] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1844.633333] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.643790] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x2000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1844.725957] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.756016] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:16 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1844.781506] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.870987] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.908955] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.951745] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1844.992075] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:16 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x9000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:16 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x30000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x300000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:16 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:16 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x4000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1845.261368] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.262771] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.276045] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.281686] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.321688] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.330303] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.335332] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x5000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:17 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x88000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1845.463575] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.509847] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.522070] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:17 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x6000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1845.556028] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.641602] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.690849] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.701757] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.713969] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.748491] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1845.760046] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:17 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xa000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x400000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:17 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xfeffff07, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x7000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:17 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1846.073801] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.079812] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.097337] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.111654] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.136617] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.149726] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:17 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x7fffffe, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:17 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x100000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1846.332870] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.336012] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.356787] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x500000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1846.375669] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.401846] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.410505] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x11000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1846.439866] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xb000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:18 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x200000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:18 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:18 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1846.567204] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x20000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1846.665369] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.677388] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.695372] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x600000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1846.721775] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.740625] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.743250] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.766107] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:18 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x300000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:18 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:18 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xc000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:18 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x23000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1846.920751] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1846.945263] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x800000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1847.010083] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.027973] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.048082] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.068911] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.105990] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:18 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x400000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:18 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:18 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:18 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x30000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1847.266533] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.278501] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.287115] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.289739] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.330151] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.342895] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1847.373707] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x500000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xe00000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:19 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:19 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3f000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1847.524159] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xd000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1847.567430] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.616358] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.627011] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x600000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:19 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1847.801026] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.808200] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.815086] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.825999] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.828987] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x1000000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1847.850152] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1847.921426] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x60000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:19 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:19 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:19 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x700000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1848.063898] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.096574] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.116333] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.156483] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x3f00000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:19 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xe000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:19 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x88000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1848.166939] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.188568] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.235720] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:19 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x1100000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:19 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:19 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1848.289829] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.394285] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.439752] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.452032] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.475039] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0xfeffff07, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1848.484817] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.486824] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x4000000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1848.555615] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:20 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2300000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:20 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xf000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1848.682326] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.696567] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.725364] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.750189] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x100000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1848.780490] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1848.827139] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3000000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:20 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:20 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x200000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1848.942685] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.956834] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1848.972468] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfd00000000000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1849.017546] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.033324] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.042971] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.055826] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:20 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:20 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x300000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:20 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x8800000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:20 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:20 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x10000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfdfdffff00000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1849.250118] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.274334] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.311537] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.331400] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.342748] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x400000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1849.369267] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.385547] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.422982] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:21 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0xfdffffff00000000, @raw_hdlc=&(0x7f00000001c0)}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:21 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xfeffff0700000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1849.575400] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x500000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1849.621269] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.656271] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.701407] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.725552] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.731271] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1849.757837] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1849.812523] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:21 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xffffffff00000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1849.928508] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x600000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1850.008375] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.033265] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.043650] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.072354] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.077285] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.128273] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:21 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x11000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x2}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:21 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:21 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:21 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x700000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:21 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d02, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1850.298867] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.310474] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.333136] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.334522] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x1100000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1850.384179] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.393377] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.422649] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:22 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:22 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d03, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1850.560215] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x3}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1850.624298] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.673531] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.697808] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1850.744780] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.852128] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.890294] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1850.938553] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x12000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:22 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x2000000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:22 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x4}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:22 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d04, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:22 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1851.124216] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.132580] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.133884] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.154737] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.164632] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1851.191855] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:22 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x2300000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:22 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d05, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:23 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1851.296997] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x5}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1851.391656] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.411082] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.420102] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.421127] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x13000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:23 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1851.462410] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3000000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1851.537943] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d06, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:23 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1851.622263] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.632453] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x6}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1851.736121] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.770765] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3f00000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1851.823780] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1851.838178] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:23 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:23 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d07, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1851.974957] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.001227] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:23 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:23 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x6000000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1852.119734] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.145414] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.237033] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.249544] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.258180] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.263985] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x8800000000000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x8}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:24 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d11, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:24 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x14000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:24 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1852.344785] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1852.418270] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.449820] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.481182] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.500458] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.511119] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1852.555837] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d23, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:24 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0xfeffff0700000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1852.621338] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.646136] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xe}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1852.725247] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.759236] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1852.783600] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1852.862720] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1852.867400] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0xffffffff00000000, 0x0, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:24 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:24 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d30, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1852.996488] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.059262] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.088935] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.123545] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.149355] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.222257] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:24 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x15000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x10}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:24 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:24 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:24 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d88, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:25 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1853.340060] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.350857] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.391134] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.400715] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1853.436069] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.437663] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.462351] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:25 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1853.605950] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.656565] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d03], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1853.716065] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.763982] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.814228] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x4, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1853.865031] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.943106] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1853.947704] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x16000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:25 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:25 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:25 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x5, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x300}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:25 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d2f], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1854.175779] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.187514] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.196165] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.204939] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x6, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1854.225075] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.236528] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.241662] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:25 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:25 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:26 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1854.326827] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x500}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1854.402849] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.416855] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.432607] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x7, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1854.470920] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.487853] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.500004] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x17000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:26 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1854.572823] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:26 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:26 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x11, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1854.693780] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.712756] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.750005] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.766185] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.774957] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1854.791886] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x600}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:26 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x4], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1854.819345] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:26 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1854.952604] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x23, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1855.047454] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.071255] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.088321] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.097556] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.114021] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.159234] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:26 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:26 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x5], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1855.358402] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.395377] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.430688] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.460886] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x1f000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:27 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x30, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xe00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:27 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:27 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:27 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x6], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1855.533283] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.551372] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.554720] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.595231] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.595396] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.618534] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.630800] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:27 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:27 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x60, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:27 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x3f00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1855.762281] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.816639] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.833415] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.860687] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.886760] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1855.908521] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1855.993231] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.008848] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x20000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:27 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:27 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x88, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1856.044854] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.068545] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.083927] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x11], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1856.113371] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x4000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:27 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1856.258918] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.274910] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:27 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x300, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1856.352540] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1856.397265] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.412609] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.480140] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.486803] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfd00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:28 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x23], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:28 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x500, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1856.548523] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.735860] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.745123] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.755408] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x23000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:28 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:28 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:28 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x600, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:28 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x1000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1856.995757] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1856.999598] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.013922] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.024158] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.029211] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x700, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1857.064231] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.076896] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x88], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:28 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1857.173057] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:28 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:28 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x1100, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1857.255317] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.282125] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.285686] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x2000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1857.337369] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.349640] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.368278] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.396835] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x25000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:29 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:29 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:29 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:29 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x300], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1857.563631] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.587248] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.615645] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.619730] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.643603] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.656193] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x3000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1857.668101] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:29 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2300, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:29 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x500], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:29 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1857.882253] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.918446] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.957137] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.968220] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1857.979918] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1858.013630] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.038033] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:29 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1858.155929] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.197259] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.235975] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x26000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x4000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:30 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x600], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:30 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:30 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:30 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3f00, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1858.412411] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.422182] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.439247] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.439822] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x6000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1858.481482] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.482425] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.513450] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:30 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x700], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1858.616270] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1858.657120] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.694396] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x5000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1858.697205] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.731303] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1858.770016] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.829036] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.874021] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1858.904133] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x27000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:30 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x8800, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:30 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x1100], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:30 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:30 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1859.010913] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.019779] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x6000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1859.066507] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.091201] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.105203] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.112980] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x1000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1859.164905] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:30 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2300], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:30 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1859.248670] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.271324] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:31 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1859.329387] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.350430] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x29000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x8000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1859.434634] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.454198] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1859.498675] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1859.588262] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1859.636720] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.672179] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1859.690786] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.718453] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.743869] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1859.776529] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x8800], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1859.810480] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xe000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:31 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:31 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x2a000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:31 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x4000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:31 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1859.972336] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.020933] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x1000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1860.131762] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.159250] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.167996] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x10000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1860.187681] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.223997] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:31 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1860.276885] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x5000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1860.338072] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.363681] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1860.406744] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1860.465531] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x2b000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:32 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:32 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x6000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1860.508697] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.547357] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x3f000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1860.620598] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.645990] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.660389] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1860.696644] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:32 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x7000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1860.864147] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.876669] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1860.906667] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.949460] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1860.970053] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x40000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:32 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:32 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x7fffffe, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1861.076071] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:32 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1861.164065] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.182992] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.214021] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.227473] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.272800] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.308895] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x38000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:33 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x4000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:33 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x11000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:33 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:33 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfd000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1861.479194] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.490165] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.500005] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.527696] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.537468] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.549527] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x5000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:33 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x20000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:33 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1861.675732] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.731770] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.749338] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.761455] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfdfdffff}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1861.791387] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1861.815704] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x23000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1861.886119] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x40000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:33 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x6000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:33 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1861.997927] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.023536] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.068169] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.073556] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.076720] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1862.111113] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfdffffff}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:33 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x30000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1862.175724] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1862.231548] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:33 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1862.308277] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:34 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x44000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1862.395138] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.413714] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.468074] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.475286] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.487824] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.510135] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfffffdfd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:34 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:34 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3f000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:34 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7fffffe], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:34 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1862.633197] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.716713] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.742838] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1862.761679] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.776271] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.788747] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:34 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x11000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1862.872232] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfffffffd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:34 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x60000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1862.952977] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1862.962198] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x48000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1863.019904] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.037209] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1863.062292] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.083861] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.143848] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:34 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x23000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:34 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x88000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1863.194112] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x100000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1863.272314] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.333991] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.369679] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1863.385905] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xfeffff07, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:35 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1863.507541] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.525653] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.579948] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.597764] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x100000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x200000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1863.671518] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x30000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1863.746325] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.778093] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.892265] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1863.951085] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:35 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:35 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x200000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:35 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x88000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:35 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x4c000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x300000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1864.089941] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.100373] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.104077] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.115975] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x300000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1864.152816] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.185684] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0xfeffff07], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1864.201549] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.234163] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:35 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:36 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:36 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x400000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x400000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:36 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x54000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1864.368369] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.406477] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.444909] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.486342] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.495778] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.497915] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1864.551261] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x500000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:36 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x100000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1864.654256] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x500000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1864.706804] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.716175] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:36 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x600000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1864.753441] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1864.825133] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x60000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1864.903057] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.905507] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.946199] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1864.985080] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x200000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:36 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x700000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1865.010194] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x600000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1865.138342] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.178917] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.198975] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1865.222389] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.243456] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:36 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x1100000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:37 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1865.316529] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x300000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:37 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x80ffffff}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1865.381444] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.403973] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x800000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:37 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1865.466409] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2000000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1865.531926] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.560186] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.573938] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.638945] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:37 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x2300000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1865.688479] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xe00000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:37 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x400000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:37 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3000000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:37 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1865.828214] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.840543] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.865831] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1865.929809] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1865.982428] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.026331] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:37 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x3f00000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1866.067383] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.096315] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.141363] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.167526] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.212965] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:38 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x8dffffff}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:38 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x500000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:38 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x1000000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:38 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:38 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x6000000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1866.398520] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.405328] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.420561] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.421512] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.445366] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.457367] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.473174] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:38 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x8800000000000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:38 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:38 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:38 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x600000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1866.634857] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x3f00000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1866.683473] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.687009] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:38 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1866.756287] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.781556] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.852971] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.894288] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1866.995199] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:38 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xa0ff0000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:38 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xfeffff0700000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:38 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x700000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:38 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:38 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x4000000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1867.238201] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.255813] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.260553] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.272666] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.282397] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.308191] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.323782] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x1100000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:39 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0xffffffff00000000, 0x20001d00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:39 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:39 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1867.445202] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfd00000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1867.546775] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.561254] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.585730] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.613820] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2300000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1867.671910] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.810480] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1867.856057] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xbfffffff}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:39 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d02, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:39 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:39 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:39 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3000000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfdfdffff00000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1868.085137] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.090863] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.102788] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.115354] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.126604] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1868.138670] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.148939] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:39 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x8800000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:39 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d03, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1868.285391] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.304387] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0xfdffffff00000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:40 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1868.350852] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.389669] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1868.480075] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d04, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:40 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xc0ffffff}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:40 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0xfeffff0700000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1868.534178] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.549516] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:40 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1868.609273] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.646565] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.698726] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d05, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1868.742663] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.770459] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.783845] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0xffffffff00000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x2}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1868.829321] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1868.870113] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.900307] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.960149] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1868.985512] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xe8030000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:40 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d06, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:40 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1869.019198] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.073260] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x2, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:40 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1869.136165] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.163928] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x3}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1869.213529] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.258969] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.295617] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:41 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d07, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1869.321937] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.345032] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x3, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:41 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xea010000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1869.441570] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.452251] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1869.488993] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x4}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:41 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1869.567491] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d11, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1869.625071] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.647854] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x4, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1869.714972] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.723401] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.766191] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1869.819200] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d23, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:41 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1869.864039] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x5}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:41 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xeffdffff}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:41 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x5, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1869.956081] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1869.965137] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.009524] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.024291] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d30, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1870.070337] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.086588] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.102554] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:41 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:41 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1870.240919] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.273374] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x6, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x6}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:42 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1870.346131] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.376157] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.393398] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d60, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1870.442960] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1870.510070] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.541145] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.543274] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.613504] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.622145] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:42 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d88, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1870.656971] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.776567] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.790371] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1870.827263] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xf4010000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:42 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x7, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x8}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:42 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20005b00, 0x20001d30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:42 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:42 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1871.005103] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.018192] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.028043] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.035694] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.038455] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1871.064339] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.092197] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d03], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1871.133834] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x11, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1871.203637] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1871.258770] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.281517] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xe}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:43 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d23], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1871.315806] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.334273] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.384666] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xff000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:43 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1871.425736] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x23, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:43 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1871.519739] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d2b], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1871.583310] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.616696] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.632205] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x10}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1871.679577] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.717577] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.730292] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:43 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d2d], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:43 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x30, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1871.874162] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1871.972275] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.980963] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1871.993829] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:43 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d2f], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1872.089567] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.104998] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.151267] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.207809] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:44 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xfffffdef}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:44 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:44 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x88, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:44 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:44 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d5b], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x300}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1872.450316] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.465643] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.467953] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.484289] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:44 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x300, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:44 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1872.501090] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.523466] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:44 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1872.667562] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.688354] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.697096] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.718056] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.735963] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.750166] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1872.754908] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:44 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x500, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:44 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:44 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1872.996565] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.005327] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.036156] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.041511] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.057050] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.124694] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:44 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xffffff7f}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:44 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x500}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:44 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x600, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:44 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:44 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1873.348197] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.361453] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.365891] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1873.405438] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.417033] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.419676] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x4], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:45 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1873.552723] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x600}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:45 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x700, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1873.597598] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.630280] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.639455] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1873.671597] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.703456] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.763705] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xffffff80}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:45 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x5], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:45 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1873.845583] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1873.869762] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x1100, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:45 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x6], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1873.899977] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xe00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:45 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1873.993492] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.005671] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.031750] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.078258] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x2300, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:45 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1874.133441] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:45 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:45 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xffffff8d}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1874.247460] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.260502] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.272823] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.287292] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x3f00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:46 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1874.323969] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.335308] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x3000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1874.421886] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x11], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1874.487194] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:46 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1874.553197] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.605381] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.617631] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.671221] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x4000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:46 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x8800, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1874.719089] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.730802] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xffffffbf}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:46 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:46 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x23], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1874.819969] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.848418] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1874.899848] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.921773] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1874.979836] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.002693] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x30], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:46 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1875.033508] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.067178] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfd00}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:46 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x1000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1875.155841] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:46 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1875.234195] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.313481] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x60], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1875.356758] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.416516] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x1000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:47 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1875.467247] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.629983] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.678607] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xffffffc0}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:47 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:47 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x88], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:47 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1875.788166] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1875.798322] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x2000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1875.845082] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1875.929607] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:47 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x300], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1876.031126] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1876.066596] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1876.080744] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1876.225385] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1876.699175] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1876.902774] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:48 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x2000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:48 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:48 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x500], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x3000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:48 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:48 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x10000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1877.234134] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.236747] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.254002] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:49 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1877.309306] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:49 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x600], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:49 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1877.409697] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.444931] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x4000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:49 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x5b, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1877.506317] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.524119] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.584082] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:49 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x700], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1877.640442] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.669520] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1877.748127] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1878.181110] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1878.763545] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:50 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x3000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:50 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x4000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:50 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:50 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x5000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:50 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x1100], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1879.213751] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.219935] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.240009] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.263896] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.289895] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:51 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:51 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x4, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:51 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1879.495867] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.529988] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x6000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:51 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2300], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1879.557499] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.590764] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.630826] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.661163] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:51 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1879.860007] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1879.903703] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1880.654767] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1881.153709] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:53 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x4000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:53 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:53 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x6, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x8000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:53 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:53 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x40030000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1881.966244] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1881.966365] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1881.976505] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1881.996286] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.031922] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:53 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:53 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3f00], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:53 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x5b, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xe000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1882.226350] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.298439] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.315766] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.323728] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.397523] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:54 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x6000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:54 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1ffffa, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1882.612159] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1882.925699] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1883.982635] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1884.251049] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:57 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x5000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:04:57 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x10000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:57 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x8800], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:04:57 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x100000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:04:57 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x7ffffff2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1885.471518] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1885.510736] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:57 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x2f, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:57 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x1000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1885.586826] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1885.604568] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1885.642869] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1885.672894] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:04:57 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x30, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:04:57 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:04:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x3f000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:04:57 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1885.803543] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1885.880147] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1885.881674] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1885.899437] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1885.954980] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1887.142428] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1887.800844] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:00 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x6000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:00 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x200000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:05:00 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0xc8, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:00 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:00 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x40000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1889.248927] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1889.271129] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1889.291742] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1889.296427] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:01 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1889.344208] kernel msg: ebtables bug: please report to author: Wrong len argument 20:05:01 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0xf8, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1889.415926] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfd000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1889.464463] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:01 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x4000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1889.517775] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1889.579599] kernel msg: ebtables bug: please report to author: Wrong len argument 20:05:01 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x123, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1889.638465] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:01 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1889.788195] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1889.836390] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1889.851834] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1889.906885] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1891.322034] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1892.038367] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:05 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x7000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:05 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x5000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfdfdffff}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:05:05 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x15b, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:05 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:05 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x300000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1893.959436] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1893.973645] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1893.986842] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.020272] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.021477] kernel msg: ebtables bug: please report to author: Wrong len argument 20:05:05 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x6000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:05 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:05 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x20001c68, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfdffffff}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1894.254991] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1894.267360] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.285854] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.316620] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.330560] kernel msg: ebtables bug: please report to author: Wrong len argument 20:05:06 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:06 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1894.571256] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.586063] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1894.655068] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1896.639627] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1896.891661] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:10 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x7fffffe, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:10 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b5b, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfffffdfd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:05:10 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x7fffffe], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:10 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:10 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x400000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1899.039466] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.048388] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.054835] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:10 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x11000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1899.098432] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:10 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x2, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xfffffffd}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:05:10 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1899.263261] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.346822] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:11 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x20000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1899.404586] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:11 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x3, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1899.485737] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.519581] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.615707] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1899.653926] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1901.928939] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1902.038697] [ 1902.040361] ====================================================== [ 1902.046682] WARNING: possible circular locking dependency detected [ 1902.052998] 5.0.0-rc3 #36 Not tainted [ 1902.056786] ------------------------------------------------------ [ 1902.063114] kswapd1/1551 is trying to acquire lock: [ 1902.068141] 00000000df7295a0 (&sb->s_type->i_mutex_key#12){+.+.}, at: shmem_fallocate+0x168/0x1200 [ 1902.077256] [ 1902.077256] but task is already holding lock: [ 1902.083222] 000000001d719f43 (fs_reclaim){+.+.}, at: __fs_reclaim_acquire+0x0/0x30 [ 1902.091069] [ 1902.091069] which lock already depends on the new lock. [ 1902.091069] [ 1902.099379] [ 1902.099379] the existing dependency chain (in reverse order) is: [ 1902.106995] [ 1902.106995] -> #1 (fs_reclaim){+.+.}: [ 1902.112812] fs_reclaim_acquire.part.0+0x24/0x30 [ 1902.118088] __alloc_pages_nodemask+0x7f0/0xdc0 [ 1902.123276] alloc_pages_vma+0xdd/0x540 [ 1902.127770] shmem_alloc_page+0xc0/0x1b0 [ 1902.132350] shmem_alloc_and_acct_page+0x218/0xd90 [ 1902.137796] shmem_getpage_gfp+0x68d/0x4b70 [ 1902.142630] shmem_write_begin+0x105/0x1e0 [ 1902.147385] generic_perform_write+0x2a0/0x6b0 [ 1902.152483] __generic_file_write_iter+0x25e/0x630 [ 1902.157929] generic_file_write_iter+0x34e/0x6a0 [ 1902.163203] __vfs_write+0x764/0xb40 [ 1902.167440] vfs_write+0x20c/0x580 [ 1902.171515] ksys_write+0x105/0x260 [ 1902.175662] __x64_sys_write+0x73/0xb0 [ 1902.180067] do_syscall_64+0x1a3/0x800 [ 1902.184471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1902.190171] [ 1902.190171] -> #0 (&sb->s_type->i_mutex_key#12){+.+.}: [ 1902.196934] lock_acquire+0x1db/0x570 [ 1902.201744] down_write+0x8a/0x130 [ 1902.205802] shmem_fallocate+0x168/0x1200 [ 1902.210467] ashmem_shrink_scan+0x239/0x630 [ 1902.215308] do_shrink_slab+0x4e5/0xd30 [ 1902.219807] shrink_slab+0x6bb/0x8c0 [ 1902.224034] shrink_node+0x61a/0x17e0 [ 1902.228786] balance_pgdat+0xb00/0x18b0 [ 1902.233274] kswapd+0x839/0x1330 [ 1902.237156] kthread+0x357/0x430 [ 1902.241041] ret_from_fork+0x3a/0x50 [ 1902.245260] [ 1902.245260] other info that might help us debug this: [ 1902.245260] [ 1902.253819] Possible unsafe locking scenario: [ 1902.253819] [ 1902.259866] CPU0 CPU1 [ 1902.264639] ---- ---- [ 1902.269291] lock(fs_reclaim); [ 1902.272576] lock(&sb->s_type->i_mutex_key#12); [ 1902.279844] lock(fs_reclaim); [ 1902.285634] lock(&sb->s_type->i_mutex_key#12); [ 1902.290384] [ 1902.290384] *** DEADLOCK *** [ 1902.290384] [ 1902.296438] 3 locks held by kswapd1/1551: [ 1902.300570] #0: 000000001d719f43 (fs_reclaim){+.+.}, at: __fs_reclaim_acquire+0x0/0x30 [ 1902.308726] #1: 0000000035216231 (shrinker_rwsem){++++}, at: shrink_slab+0x52c/0x8c0 [ 1902.316705] #2: 000000003039822b (ashmem_mutex){+.+.}, at: ashmem_shrink_scan+0xb5/0x630 [ 1902.325037] [ 1902.325037] stack backtrace: [ 1902.329544] CPU: 1 PID: 1551 Comm: kswapd1 Not tainted 5.0.0-rc3 #36 [ 1902.336034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1902.345381] Call Trace: [ 1902.347975] dump_stack+0x1db/0x2d0 [ 1902.351701] ? dump_stack_print_info.cold+0x20/0x20 [ 1902.356788] ? print_stack_trace+0x77/0xb0 [ 1902.361023] ? vprintk_func+0x86/0x189 [ 1902.364911] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1902.370272] __lock_acquire+0x3014/0x4a30 [ 1902.374412] ? mark_held_locks+0x100/0x100 [ 1902.378665] ? mark_held_locks+0x100/0x100 [ 1902.382900] ? free_one_page+0xc53/0x1660 [ 1902.387049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.392590] ? check_preemption_disabled+0x48/0x290 [ 1902.397636] ? __this_cpu_preempt_check+0x1d/0x30 [ 1902.402476] ? __lock_is_held+0xb6/0x140 [ 1902.406539] lock_acquire+0x1db/0x570 [ 1902.410335] ? shmem_fallocate+0x168/0x1200 [ 1902.414660] ? ___might_sleep+0x1e7/0x310 [ 1902.418805] ? lock_release+0xc40/0xc40 [ 1902.422781] down_write+0x8a/0x130 [ 1902.426319] ? shmem_fallocate+0x168/0x1200 [ 1902.430638] ? down_read+0x120/0x120 [ 1902.434347] ? check_preemption_disabled+0x48/0x290 [ 1902.439359] ? kernel_poison_pages+0x16e/0x2b0 [ 1902.443972] shmem_fallocate+0x168/0x1200 [ 1902.448118] ? perf_trace_lock+0x750/0x750 [ 1902.452352] ? shmem_setattr+0xd90/0xd90 [ 1902.456414] ? lock_downgrade+0x910/0x910 [ 1902.460567] ? lock_acquire+0x1db/0x570 [ 1902.464557] ? ashmem_shrink_scan+0xb5/0x630 [ 1902.468982] ? lock_release+0xc40/0xc40 [ 1902.472952] ? kasan_check_write+0x14/0x20 [ 1902.477185] ? kasan_check_read+0x11/0x20 [ 1902.481333] ? wait_for_completion+0x810/0x810 [ 1902.485916] ? mutex_trylock+0x248/0x2d0 [ 1902.489972] ? ashmem_shrink_scan+0xb5/0x630 [ 1902.494365] ? __ww_mutex_check_waiters+0x160/0x160 [ 1902.499391] ? add_lock_to_list.isra.0+0x450/0x450 [ 1902.504311] ashmem_shrink_scan+0x239/0x630 [ 1902.508619] ? ashmem_release+0x190/0x190 [ 1902.512753] do_shrink_slab+0x4e5/0xd30 [ 1902.516714] ? snapshot_refaults+0x290/0x290 [ 1902.521105] ? down_read_trylock+0xda/0x140 [ 1902.525512] ? shrink_slab+0x52c/0x8c0 [ 1902.529383] ? downgrade_write+0x270/0x270 [ 1902.533608] shrink_slab+0x6bb/0x8c0 [ 1902.537319] ? unregister_memcg_shrinker.isra.0+0x50/0x50 [ 1902.542842] ? mem_cgroup_from_id+0x30/0x30 [ 1902.547150] ? free_unref_page_list+0x10e0/0x10e0 [ 1902.551976] shrink_node+0x61a/0x17e0 [ 1902.555766] ? shrink_node_memcg+0x19b0/0x19b0 [ 1902.560332] ? pgdat_balanced+0x1dc/0x270 [ 1902.564463] ? do_shrink_slab+0xd30/0xd30 [ 1902.568601] ? kasan_check_write+0x14/0x20 [ 1902.572820] balance_pgdat+0xb00/0x18b0 [ 1902.576783] ? mem_cgroup_shrink_node+0xb40/0xb40 [ 1902.581611] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1902.586610] ? kasan_check_read+0x11/0x20 [ 1902.590746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.596276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.601798] ? check_preemption_disabled+0x48/0x290 [ 1902.606800] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 1902.612318] ? rcu_pm_notify+0xd0/0xd0 [ 1902.616193] kswapd+0x839/0x1330 [ 1902.619551] ? balance_pgdat+0x18b0/0x18b0 [ 1902.623773] ? lock_acquire+0x1db/0x570 [ 1902.627732] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1902.632817] ? finish_wait+0x490/0x490 [ 1902.636690] ? trace_hardirqs_on+0xbd/0x310 [ 1902.640997] ? kasan_check_read+0x11/0x20 [ 1902.645130] ? __kthread_parkme+0xc3/0x1b0 [ 1902.649348] ? trace_hardirqs_off_caller+0x300/0x300 [ 1902.654536] ? schedule+0x108/0x350 [ 1902.658144] ? do_raw_spin_trylock+0x270/0x270 [ 1902.662711] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1902.667887] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1902.673408] ? __kthread_parkme+0xfb/0x1b0 [ 1902.677626] kthread+0x357/0x430 [ 1902.680973] ? balance_pgdat+0x18b0/0x18b0 [ 1902.685277] ? kthread_stop+0x920/0x920 [ 1902.689320] ret_from_fork+0x3a/0x50 [ 1903.011150] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:15 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x11000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:15 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:15 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x23000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x100000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:05:15 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x4, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:15 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x500000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1904.287030] kobject: 'loop1' (00000000f7541090): kobject_uevent_env [ 1904.305871] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.313948] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.314863] kobject: 'loop1' (00000000f7541090): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1904.332302] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.355029] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.378708] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x30000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:16 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x23000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1904.419021] kobject: 'loop0' (000000006b61e660): kobject_uevent_env [ 1904.428612] kobject: 'loop0' (000000006b61e660): fill_kobj_path: path = '/devices/virtual/block/loop0' 20:05:16 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:16 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x5, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1904.486125] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.521392] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:16 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x30000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1904.538607] kobject: 'loop1' (00000000f7541090): kobject_uevent_env [ 1904.568776] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.579668] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="2a00000029020000840420000000000002211b766d9964a01b5e0e930000000000000000004c4167b84971e8181db7838d7daadb01e34962fec07260ad0fce7c62ba937cff358f3c37e52eeaf9b48eff3eb9b13bbecd489f962e481acbe1d0cfd86724a827c42720ea6c5bf61b38ba64971c92f6410caa09e82ad135e417a761934db369b3aeb788925903ede4b29f40c147b667becfb42abfe7439a42fef38c73d66552898d8006da965942e62080f61b12be7e2583bf53d494ae2467f106b80889d9b9fc76d066f12b4014f5621240b923481101a5b97ea9de07d01885388d7140650466034bf9a4ae7e4aae60bc595dc7e16e6e0c293040bf717a5441d404c64576786bd589dfe9f07e0d4bb14400ce9e1f9aa65008ead66d50b74adb8217bc57a721313cea3f899b1b66870019bf5e1821948b2e0a422860bb2741f764a8ac45630db7080063fc411c9a98a0c262"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x200000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1904.580262] kobject: 'loop1' (00000000f7541090): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1904.617468] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:16 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x88000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:16 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x3f000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1904.672809] kobject: 'loop2' (0000000044b6e273): kobject_uevent_env [ 1904.706215] kobject: 'loop2' (0000000044b6e273): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:05:16 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x6, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1904.742906] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.767836] kobject: 'loop5' (000000000885cc23): kobject_uevent_env 20:05:16 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0xfeffff07, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1904.790621] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.799770] kobject: 'loop5' (000000000885cc23): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1904.813114] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.833216] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.843153] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.853429] kobject: 'loop1' (00000000f7541090): kobject_uevent_env [ 1904.904720] kobject: 'loop1' (00000000f7541090): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1904.932107] kobject: 'loop4' (00000000af6e87cf): kobject_uevent_env [ 1904.938710] kobject: 'loop4' (00000000af6e87cf): fill_kobj_path: path = '/devices/virtual/block/loop4' 20:05:16 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x600000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:05:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x60000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x300000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:05:16 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x7, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:16 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:16 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x100000000000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1904.953112] kobject: 'loop2' (0000000044b6e273): kobject_uevent_env [ 1904.971339] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.984775] kobject: 'loop2' (0000000044b6e273): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1904.997638] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1904.998280] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.008149] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.016424] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.031682] kobject: 'loop0' (000000006b61e660): kobject_uevent_env [ 1905.047239] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:16 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x88000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1905.049797] kobject: 'loop0' (000000006b61e660): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1905.066599] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:16 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x11, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1905.121390] kobject: 'loop5' (000000000885cc23): kobject_uevent_env [ 1905.128168] kobject: 'loop5' (000000000885cc23): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1905.140863] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.162892] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:16 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x200000000000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:16 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0xfeffff07], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1905.163286] kobject: 'loop5' (000000000885cc23): kobject_uevent_env [ 1905.202525] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.212164] kobject: 'loop5' (000000000885cc23): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:05:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x400000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1905.232356] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.235928] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.249449] kobject: 'loop4' (00000000af6e87cf): kobject_uevent_env [ 1905.253400] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.257710] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.272399] kobject: 'loop4' (00000000af6e87cf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1905.284352] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.295795] kobject: 'loop1' (00000000f7541090): kobject_uevent_env [ 1905.305055] kobject: 'loop1' (00000000f7541090): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1905.333970] kobject: 'loop0' (000000006b61e660): kobject_uevent_env [ 1905.346827] kobject: 'loop0' (000000006b61e660): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1905.367262] kobject: 'loop3' (00000000440783a2): kobject_uevent_env 20:05:17 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x700000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:05:17 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x100000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x23, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:17 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x300000000000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1905.395570] kobject: 'loop3' (00000000440783a2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1905.409403] kobject: 'loop0' (000000006b61e660): kobject_uevent_env [ 1905.427124] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.432576] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x500000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1905.445374] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.453785] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.462257] kobject: 'loop0' (000000006b61e660): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1905.467314] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.474850] kobject: 'loop5' (000000000885cc23): kobject_uevent_env [ 1905.486817] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:17 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1905.500654] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.528832] kobject: 'loop5' (000000000885cc23): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:05:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x30, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:17 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x400000000000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1905.547886] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.564980] kobject: 'loop1' (00000000f7541090): kobject_uevent_env [ 1905.571697] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.618912] kobject: 'loop1' (00000000f7541090): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1905.641619] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.650657] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.662112] kobject: 'loop0' (000000006b61e660): kobject_uevent_env 20:05:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x200000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1905.676028] kobject: 'loop0' (000000006b61e660): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1905.686629] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.695140] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:17 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1905.728597] kobject: 'loop4' (00000000af6e87cf): kobject_uevent_env [ 1905.742844] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.762771] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x60, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1905.769197] kobject: 'loop4' (00000000af6e87cf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1905.817075] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.838822] kobject: 'loop2' (0000000044b6e273): kobject_uevent_env [ 1905.853443] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.861281] kobject: 'loop2' (0000000044b6e273): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1905.872228] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.887706] kobject: 'loop0' (000000006b61e660): kobject_uevent_env [ 1905.904267] kobject: 'loop0' (000000006b61e660): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1905.919349] kobject: 'loop1' (00000000f7541090): kobject_uevent_env [ 1905.931774] kobject: 'loop1' (00000000f7541090): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1905.942252] kobject: 'loop3' (00000000440783a2): kobject_uevent_env [ 1905.949127] kobject: 'loop3' (00000000440783a2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1905.959501] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1905.960099] kobject: 'loop4' (00000000af6e87cf): kobject_uevent_env [ 1905.977664] kobject: 'loop4' (00000000af6e87cf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1905.989222] kobject: 'loop2' (0000000044b6e273): kobject_uevent_env [ 1905.996149] kobject: 'loop2' (0000000044b6e273): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1906.011536] kobject: 'loop0' (000000006b61e660): kobject_uevent_env 20:05:17 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x800000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:05:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x600000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:05:17 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x500000000000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x300000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:17 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) 20:05:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x88, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1906.019077] kobject: 'loop0' (000000006b61e660): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1906.032273] kobject: 'loop2' (0000000044b6e273): kobject_uevent_env [ 1906.041565] kobject: 'loop2' (0000000044b6e273): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1906.063012] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.080861] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.082122] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.089752] kobject: 'loop5' (000000000885cc23): kobject_uevent_env [ 1906.102316] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.106813] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.118831] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.123984] kobject: 'loop5' (000000000885cc23): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1906.146902] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x400000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1906.174342] kobject: 'loop4' (00000000af6e87cf): kobject_uevent_env [ 1906.200610] kobject: 'loop4' (00000000af6e87cf): fill_kobj_path: path = '/devices/virtual/block/loop4' 20:05:17 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x300, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 20:05:17 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1906.230823] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.240236] kobject: 'loop0' (000000006b61e660): kobject_uevent_env [ 1906.255540] kobject: 'loop0' (000000006b61e660): fill_kobj_path: path = '/devices/virtual/block/loop0' 20:05:17 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x500000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1906.278262] kobject: 'loop2' (0000000044b6e273): kobject_uevent_env [ 1906.287336] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.303109] kobject: 'loop2' (0000000044b6e273): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1906.315886] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:18 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x600000000000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) [ 1906.327613] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.338096] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.346956] kobject: 'loop5' (000000000885cc23): kobject_uevent_env [ 1906.356033] kobject: 'loop5' (000000000885cc23): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1906.370995] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x800000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1906.387300] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.407561] kobject: 'loop3' (00000000440783a2): kobject_uevent_env [ 1906.423293] kobject: 'loop3' (00000000440783a2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1906.438147] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.460654] kobject: 'loop0' (000000006b61e660): kobject_uevent_env [ 1906.490574] kobject: 'loop0' (000000006b61e660): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1906.519374] kobject: 'loop2' (0000000044b6e273): kobject_uevent_env [ 1906.540175] kobject: 'loop2' (0000000044b6e273): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1906.551008] kobject: 'loop5' (000000000885cc23): kobject_uevent_env [ 1906.557572] kobject: 'loop5' (000000000885cc23): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1906.567813] kobject: 'loop0' (000000006b61e660): kobject_uevent_env [ 1906.574337] kobject: 'loop0' (000000006b61e660): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1906.584921] kobject: 'loop1' (00000000f7541090): kobject_uevent_env [ 1906.591447] kobject: 'loop1' (00000000f7541090): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1906.608883] kobject: 'loop5' (000000000885cc23): kobject_uevent_env [ 1906.616229] kobject: 'loop5' (000000000885cc23): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1906.628339] kobject: 'loop0' (000000006b61e660): kobject_uevent_env 20:05:18 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0x900000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 20:05:18 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x500, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1906.638721] kobject: 'loop0' (000000006b61e660): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1906.650781] kobject: 'loop1' (00000000f7541090): kobject_uevent_env [ 1906.658596] kobject: 'loop1' (00000000f7541090): fill_kobj_path: path = '/devices/virtual/block/loop1' 20:05:18 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x600000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) 20:05:18 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x700000000000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:18 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1906.739833] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.744875] kobject: 'loop3' (00000000440783a2): kobject_uevent_env [ 1906.749382] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.771402] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0xe00000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) [ 1906.790634] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.796479] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1906.803830] kobject: 'loop3' (00000000440783a2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1906.825833] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:18 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x700000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1906.952973] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:18 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x600, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1907.050614] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:18 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x1100000000000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x1000000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="a60000004cf36312548a291f9a000000040040000019000009f93e00000000008107002e2f66e96c65308003000000010000000002000026000000000000000807002e2f66696c6530400400000006001500000000000600000000000000660700251418337c1c26ef3c856467973e427d2e2f666901651300008100000000000000000407002e2f66696c6530e001000000050000000000c9e2481e42bf66d37cd7f582cf90cb0000ff030000000000000607002e2f66694c65300000000000000000000032410f4648253ff58aef299c825cad45e56401ddec96215ac68d50eab410c36093f4f184a0700e40a27591530c9d6a6cf1abcd4f57839b74536f3200d142d44d0e58c3a82bb1b9278695ca7899c4d01fc7911139de1b5ef03062064fe37fc95f2cc78483a25f9cb551d516400000000000000000000000000000087a382b108e42077dd36e28fbbcc8e6c675f0182e7777dd2510af8b41f28880ff31e1c7e4ed0467dbe0144c06731d080875ca54f7f56701762231b85a6cdb0820a8faef2f7b72e0de31752e961ad26cfa04e235abb687e2d72eef6b1a940cfaf58748ea4b5de87b7152f558ab0c50b6a58c0770b0fd80b34f3a0a1ff5331b4f3ac92656a4cc9aa0b14c11c58f0c242ed0b1e14dc5a3df3841d64104070d2a2b293661e4e202cc2e6b10a61c702401a62da6980323fea94d86f207f39941051697ffe255137f9844061ab80d0338717c7329deb5d66095aaed683044f88f6a5674dcae2ae7e68804eadaf1e71554ebb4807cf49697a3be290f45f2e9654376d804493f866ab6c52860e3a82a397823f746826ecf78f9b89592e263c599c479e02fb20c7c2d1ff4bf89973106428100000000000000c621f794dc05e44fd148881c9f637fb759acfc448c87db76d04af7dde0f9bc727ee9f9ee768f65a897fe"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:05:18 executing program 3: socket(0x840000000002, 0x0, 0xff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) openat$audio(0xffffffffffffff9c, 0x0, 0x18200, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), 0x0}}, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x9) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000680)) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000003c0)) socketpair(0x1, 0x0, 0x81, &(0x7f00000004c0)) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {}, 0x0, 0xa00000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) dup2(r2, 0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 1907.144036] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.183725] kobject: 'loop4' (00000000af6e87cf): kobject_uevent_env 20:05:18 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1907.199828] kobject: 'loop4' (00000000af6e87cf): fill_kobj_path: path = '/devices/virtual/block/loop4' 20:05:18 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x1100000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1907.241598] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.255571] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.264228] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.280889] kobject: 'loop3' (00000000440783a2): kobject_uevent_env 20:05:18 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x700, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1907.300366] kobject: 'loop3' (00000000440783a2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1907.328156] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.338013] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.342075] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.359859] kobject: 'loop5' (000000000885cc23): kobject_uevent_env [ 1907.383176] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.392256] kobject: 'loop5' (000000000885cc23): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:05:19 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) [ 1907.463915] kobject: 'loop2' (0000000044b6e273): kobject_uevent_env 20:05:19 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x2300000000000000, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) 20:05:19 executing program 5: r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x1100, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 1907.511578] kobject: 'loop2' (0000000044b6e273): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1907.547046] kernel msg: ebtables bug: please report to author: Valid hook without chain 20:05:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x5e, "9ea6ab831b144ae7247e8ea8b6ae2259ccac434bf9f6cd66aadedf04dd82666304b0eac02d385145a31ee16a017ad8b3ad5108b37360b1ae8e148197ca8d11b2c5c9ea184bdc6797366478a371503b2c6bde72d157fee0eb47f6d3e5c7fc"}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x60400) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2003, 0x0) ioctl$RTC_PLL_SET(r5, 0x401c7012, &(0x7f0000000080)={0x2, 0x4, 0x7, 0x400, 0x7, 0x100000001, 0x49}) sysinfo(&(0x7f0000000bc0)=""/168) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x20, &(0x7f0000000080)={'veth1_to_bond\x00', @ifru_hwaddr=@random="825068043ec9"}}) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x9, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r3, 0x0) r8 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000000400)='erspan0\x00') dup2(r8, r7) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RREADDIR(r9, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x150) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f00000005c0)={0x0, @rand_addr, @remote}, &(0x7f0000000600)=0xfffffffffffffe41) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r10, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00?\x00@\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)={0x0, 0x3f00000000000000}}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RREADDIR(r11, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x29e) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000010c0)) 20:05:19 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30, 0x2000000000000000], 0x0, &(0x7f0000000000), &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7", [], @remote, [], 0x70, 0x70, 0x98}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x178) [ 1907.578493] kobject: 'loop1' (00000000f7541090): kobject_uevent_env [ 1907.613505] kobject: 'loop1' (00000000f7541090): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1907.627802] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.631076] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.653069] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.663795] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.680060] kobject: 'loop5' (000000000885cc23): kobject_uevent_env [ 1907.691422] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 1907.692079] kobject: 'loop5' (000000000885cc23): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:05:19 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = socket(0x4000000000000a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x19, 0x2, 0x128, [0x20001b40, 0x0, 0x0, 0x20001d00, 0x20001d30], 0x0, 0x0, &(0x7f0000001b40)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'erspan0\x00', 'teql0\x00', 'veth1_to_team\x00', 'vethU\x00to_te!m\x00', @random="825b005378b7",